Juniper Networks

Index

APP

APP:ENCRYPTED-TRAFFIC-2
APP:ENCRYPTED-TRAFFIC-3
APP:ENCRYPTED-TRAFFIC-1
APP:NAV-ENT-WEB-OF
APP:FREEPBX-CALLMENUM
APP:CONEXANT-LOGIN
APP:SVN-DATE-SERVE
APP:WINCOM-AUTH-BO
APP:GIOP-COMM
APP:JONDO-PROXY
APP:YOUSENDIT
APP:NTOP-WEB-FS1
APP:RH-ICOMMERCE-ANYFILE
APP:SUPERSCOUT-USERDB
APP:EMC-NETWORKER-BYPASS
APP:SCOHELP-OF1
APP:IPSO-FILE-VIEW
APP:HP-DATA-PROTECTOR-MMD-BOF
APP:CUPS-GIF-BO
APP:SECURECRT-CONF
APP:LIBGTOP-FMT-STR
APP:WINMAIL-PATH-DIS
APP:CPANEL-RESETPASS
APP:BRG-MAIL-US-PASS
APP:POSTFIX-GLD-FS
APP:COLDFUSIONMX-ACC
APP:NAV-ENT-WEB-OF-2
APP:MERCURY-BOF
APP:VMS-8.3.5-CMD-EXE
APP:MOZY-ACTY
APP:GOOG-PICASA
APP:PEER2MAIL
APP:EMC-ALPHA-BO
APP:ALTN-WORLDCLIENT-MEM
APP:SENTINEL-LM-OF
APP:HP-LOADRUNNER-RCE
APP:WINPRICE
APP:BORLAND-STARTEAM
APP:NETSUPPORT-MANAGER-BO
APP:SUNPROXY
APP:SVN-DATE-OF
APP:HP-LEFTHAND-HYDRA-PING-OF
APP:CHKPOINT-FW-INFO-DISC
APP:FEDORA-DIR-SER-INFO-LEAK
APP:RETRO-CL-BO
APP:HP-STORAGEWORKS-BOF
APP:EMC-DATA-PROTECTION-DOS
APP:ISCSI-TARGET-FMT-STR
APP:SITEMINDER-AUTH-REDIR
APP:CLAMAV-UPX-OF-SMTP
APP:CLAMAV-UPX-OF-HTTP
APP:EMC-DOS
APP:MS-SNBASE
APP:FREEPBX-ARI-DOS
APP:HP-PROCURVE-BYPASS
APP:HP-PROCRVE-SNAC-FILE-UPLD
APP:EIQ-LM-OF
APP:HP-DATA-PRTCTR-OP234-BO
APP:SQUID-HTCP-DOS
APP:LANDESK-QIP-HEAL
APP:HP-MEDIA-SIGN-IN-NAME-DOS
APP:HP-DATA-PRTCTR-OP235-BO
APP:WEBSENSE-FAV-BYPASS
APP:ZEND-SERVER-JAVA-RCE
APP:APPLE-MACOSX-ODP-RCE
APP:AFP-LEN-OF
APP:HP-LOADRUNNER-SSL
APP:HP-PROCURVE-FILE-UPLD-SSL
APP:AGENTX-RECEIVE-INT-OF
APP:FLASH-RTMP-RESP
APP:EMBARCADERO-CONNECT-OF
APP:HP-MGMT-DBMAN-OF
APP:LANDESK-OF
APP:HP-DATA-PROTECTOR-OP-DOS
APP:ADOBE-FLASH-RTMP-RCE
APP:EMC-ALPHASTOR-LIB-BOF
APP:BAOFENG-STORM-PLAYLIFL-BO
APP:ADOBE-CF-DIR-TRAV
APP:HP-DATA-PROTECTOR-DOS
APP:HP-DATA-PROTECTOR-SIGN-DOS
APP:PEERCAST-FS
APP:APPLE-CUPS-PNG-FILTER-OF
APP:HP-DATA-PRTCTR-EXEC_CMD-BO
APP:RDP-BRUTE-FORCE
APP:FCKEDITOR-RCE-UPLOAD
APP:EMC-APLHASTORE-FMTSTR
APP:UNIVERSAL-CMDB-AXIS2-RCE
APP:VMAUTH-FS
APP:WEBSENSE-TRITON-RCE
APP:QUEST-BIG-BRO-FD
APP:HP-DATA-PRTCTR-EXEC_SETUP
APP:RIM-BLACKBERRY-DOS
APP:KINDLE-BROWSER-NPAPI-RCE
APP:HP-DATA-PRTCTR-RDS-DOS
APP:NOW-SMS-OF-MSF
APP:APPLE-SIRI
APP:SPREECOMMERCE-RCE
APP:INTERSYSTEMS-CACHE-OF
APP:CHKPOINT-FW-WEBUI-REDIRECT
APP:BOMBER-BO
APP:MAL-AFP-DSI-REQ
APP:NOW-SMS-OF
APP:TRACKERCAM-OF
APP:QNX-QCONN-CMDEXEC
APP:CAIN-ABEL-CISCO-IOS-BOF
APP:HP-MGMT-UAM-BO
APP:XEROX-WORKCENTRE-BOF
APP:VERITAS-ADMIN-BO
APP:BULLETPROOF-FTP-BPS-BOF
APP:MCAFEE-EBUSINESS-RCE
APP:HP-INODEMNGCHECKER-EXE-BOF
APP:EIQ-NET-SEC-ANALYZER-DOS
APP:RSLOGIX-RSVCHOST-DOS
APP:DISKPULSE-GETSERVERINFO-OF
APP:CDE-DTSPCD-OF
APP:POSTFIX-GREYLISTD-OF
APP:IA-WEBMAIL-OF
APP:VIDEOSPIRIT-OF
APP:SAFENET-VPN-OF
APP:ISCSI-TARGET-OF
APP:VMWARE-SPRING-CLASSLOADER
APP:MERCURY-PH-BO
APP:YOUSENDIT-ENCRYPTED
APP:BAKBON-NETVAULT-HEAP-OF
APP:HP-DATA-PROTECTOR-FIN-SQL
APP:HP-DATA-PROTECTOR-REQ-SQL
APP:HP-DATA-PROTECTOR-GET-SQL
APP:EMC-ALPHASTORE-CMDEXEC
APP:FLASH-SRV-DOS
APP:EMC-AUTOSTART-BOF
APP:EMC-NETWORKER-NSRD-BO
APP:HP-PROCURVE-FUPLOAD-SSL
APP:DIGIUM-IAX2-DOS
APP:MCAFEE-ORCHESTRATOR-FS
APP:MCAFEE-ORCH-BO
APP:ASUS-DPC-PROXY-BO
APP:RDP-ISO-RECV-MSG-IUF
APP:DELL-OPENMANAGE-BO
APP:GROK-NETPROXY-SEC-BYPASS
APP:ACOUSTICA-MIXCRFT-MX4-FL-BO
APP:NOW-SMS-GW-OF
APP:APPIAN-BPM-SUITE-DOS
APP:ZLIB-COMPRES-LIB-DOS
APP:GFI-FAXMAKER-DOS
APP:INTELLITAMPER-HREF-BO
APP:BULLETPROOF-FTP-CLNT-BM-BO
APP:BULLETPROOF-FTP-BPS-FILE-BO
APP:AUDACITY-AUP-BO
APP:ASHAMPOO-BURN-SDO-ASHPRJ-BO
APP:ACRONIS-TRU-IMG-ECO-SRV-DOS
APP:INTELLITAMPER-LCTION-HDR-BO
APP:ICARUS-PGN-FILE-BO
APP:GOOLE-SKETCHUP-3DS-FILE-MC
APP:APPLE-QT-NULL-DOS
APP:AVAYA-CCRWEBCLIENT-RCE
APP:PROGEA-MOVICON-BO
APP:BAKBON-NETVAULT-INT-OF
APP:LANDESK-THINKMGT-DIRTRVRSAL
APP:HP-DATA-PROTECTOR-SQL
APP:LENOVO-RCE-UPLOAD
APP:NOVELL-EDIR-LEN-DOS
APP:CUPS-IPP-RCE
APP:HP-STORAGEWORKS-BO
APP:VMWARE-VCENTER-CHARGEBACK
APP:ABB-NETSCANHOST-OF
APP:EMC-NETWORKER-NSRINDEXD-OF
APP:FREEPBX-FILE-UPLOAD
APP:BLUECOAT-AAA-OF
APP:GE-PROFICY-RT-DIRTRAVERSAL
APP:ASTIUM-PBX-DOS
APP:VMWARE-ESX-SOAP-DOS
APP:NOVELL-NET-FTP-DEL-CMD-OF
APP:FREEPBX-RECORDING-RCE
APP:HP-LIPS-HSSPD
APP:GIMP-SCRIPTFU-OF
APP:HP-DATA-PROC-NEW-FOLDER
APP:2WIRE-DSL-VULN
APP:DISTCC-EXEC
APP:EMC-NSRINDEXD-BO
APP:DIGIUM-ASTERISK-SKINNY-DOS
APP:DIGIUM-ASTERISK-MGR-CMDEXEC
APP:HP-DBARCHIVE-GIOP-BO
APP:ICECAST-BOF
APP:DIGIUM-IAX2-POKE-DOS
APP:INDUSOFT-WEB-STUDIO-BO
APP:REALNETWORKS-HELIXSRV-DOS
APP:SIEMENS-SIMATIC-WINCC-BO
APP:INDUSOFT-WEB-STUDIO-RCE
APP:HP-STORAGEWORKS-CIFS
APP:HP-MGMT-FILE-UPLOAD
APP:BIGANT-USV-BOF
APP:BIGANT-SCH-CMD-BOF
APP:BIGANT-SERVER-FILE-UPLOAD
APP:HP-LEFTHAND-VIRT-SAN
APP:HP-SM-RCE
APP:DIGIUM-ASTERISK-OF
APP:HP-LEFTHAND-HYDRA-INFO-DISC
APP:BLUECOAT-BCAAA-BOF
APP:HP-DATA-PRTCTR-OP1091-BO
APP:HP-DATA-PRTCTR-OP1092-BO
APP:PEERCAST-CMD-BOF
APP:SVN-PROTOCOL-STRING-OF
APP:GTS-WAP-PASSDISC
APP:HP-DATA-PRTCTR-MULTI-OP-OF
APP:HP-DATA-PRTCTR-EXEC_CMD-RCE
APP:HP-DATA-PRTCTR-DBSERVER-BO
APP:WIRESHARK-LWRES
APP:REPLISTOR-DOS
APP:TROLLTECH-QT-BMP-OF
APP:FLEXERA-FLXNETPUB-IMGRD-BO
APP:MCAFEE-EPOLICY-SQLI
APP:INVISIONIX-RS-RFI
APP:EMC-ALPSTR-LIB-MGR-CMD-EXEC
APP:ACCELLION-FILE-TRANSFER
APP:VMWARE-ISAPI-DOS
APP:MCAFEE-DLP-MGR-INFO-DISCL
APP:SQUID-HTTPVER-DOS
APP:SUN-JAVA-SERVER-ADMIN-DOS
APP:YOUNGZSOFT-CONNECT
APP:AGENTX-RECEIVE-OF
APP:HORDE-WEBMAIL-CSRF
APP:HP-MGMT-BIMS-FILE-UPLOAD
APP:HP-LOGIN-BOF
APP:HP-VIRTUAL-SAN
APP:HP-MGMT-SOM-SDFILE
APP:HPIM-SOM-EUACCNT-BYPASS
APP:ADOBE-COLDFUSION-WEBSOCKET
APP:HP-ACMSERVLETDOWNLOAD
APP:HP-REPORTIMGSERVLET
APP:HP-FAULTDOWNLOADSERVLET
APP:HP-ICTDOWNLOADSERVLET
APP:HP-PM-EXP-DATA-LOGS
APP:JBOSS-JMX-AUTH-BYPASS
APP:EMC-ALPHASTOR-BOF
APP:HP-DATA-PRTCTR-OP45-46
APP:WEBSENSE-PROXY-BYPASS
APP:HP-PROCURVE-FILE-UPLOAD
APP:HP-DATA-PRTCTR-MULT-BO
APP:HP-DATA-PRTCTR-OP215-263
APP:HP-MGMT-TFTP-MODE-RCE
APP:MEDIAWIKI-RCE
APP:HP-MGMT-TFTP-DATA-OF
APP:HP-MGMT-IMG-OF
APP:HP-DATA-PROTECTOR-DTBCLS-OF
APP:EMC-REPLICATION-MGR-CMD-EXE
APP:HP-AIO-BO
APP:HP-DATA-PRTCTR-OP259-BO
APP:HP-DATA-PRTCTR-OP227-BO
APP:HP-DATA-PRTCTR-OP260-BO
APP:HP-LEFTHAND-HYDRA-DIAG-OF
APP:HP-SYS-IPRANGE-OF
APP:HP-DATA-PRTCTR-EXEC-BAR-CE
APP:HP-DATA-PRTCTR-OP305-BO
APP:VMWARE-OVF-FMTSTR
APP:HP-DATA-PRTCTR-OP-27
APP:SBS-TRAINING-OF2
APP:WINMEDIASRV-RCE
APP:HP-DATA-PRTCTR-OP42-DIR-TRV
APP:NOVELL-SECURITY-BYPASS
APP:HPLOADRUNNER-XDR-BO
APP:WSDAPI-OF
APP:MS-SNABASE-EXE-DOS
APP:MS-SMS-DOS
APP:HP-SITESCOPE-CMD-INJ
APP:HP-DATA-PRTCTR-OP
APP:HP-PWR-MGR-DIR-TRAV
APP:OBSERVICED-OF
APP:EMC-CMCNE-INFO-DISC
APP:MCAFEE-EPOLICY-XML

APP:AI

APP:AI:NO-MATCH
APP:AI:PROTOCOL-MISMATCH
APP:AI:PARTIAL-MATCH

APP:AMANDA

APP:AMANDA:AMANDA-ROOT-OF2
APP:AMANDA:AMANDA-ROOT-OF1

APP:APT-WWW-PROXY

APP:APT-WWW-PROXY:AWPLOG-DOS

APP:ARKEIA

APP:ARKEIA:DEFAULT-ADMIN-PW
APP:ARKEIA:DEFAULT-PASSWORD
APP:ARKEIA:AGENT-CONFIG
APP:ARKEIA:TYPE-77-OF
APP:ARKEIA:AGENT-ACCESS

APP:BORLAND

APP:BORLAND:STARTEAM-MPX-OF
APP:BORLAND:VISIBROKER

APP:CA

APP:CA:IGATEWAY-BOF
APP:CA:LIC-COMMAND-OF
APP:CA:ALERT-SRV-OF
APP:CA:ETRUST-ID-KEY-DOS
APP:CA:IGATEWAY-CNT-LEN-OF
APP:CA:PRODUCT-DISC-BOF
APP:CA:MESSAGE-QUEUE-HEAP
APP:CA:DBASVR-POINT
APP:CA:IGATEWAY-DEBUG
APP:CA:INTERNET-SECURITY-SUITE
APP:CA:LIC-PUTOLF-OF
APP:CA:LIC-GCR-OF-CLT
APP:CA:LIC-GETCONFIG-OF-CLT
APP:CA:LIC-GETCONFIG-OF2
APP:CA:LOG-SEC-BOF
APP:CA:ECSQDMN-DOS
APP:CA:CONSOLE-LOGIN-OVERFLOW
APP:CA:RPC-MSG-OF
APP:CA:LIC-GETCONFIG-OF-SVR
APP:CA:LIC-GCR-OF-SVR

APP:CA:ARCSRV

APP:CA:ARCSRV:LOGGERD-DOS
APP:CA:ARCSRV:UNICENTERAGENT-2
APP:CA:ARCSRV:DISCSRV-DOS
APP:CA:ARCSRV:TAPE-OP-207
APP:CA:ARCSRV:LGSERVER-CMDNAME
APP:CA:ARCSRV:SQLOF
APP:CA:ARCSRV:MEDIASERVER-BO
APP:CA:ARCSRV:MOBILE-2
APP:CA:ARCSRV:RPC-MEMCORRUPT
APP:CA:ARCSRV:BACKUP-CMD-EXEC
APP:CA:ARCSRV:BME-OP-117
APP:CA:ARCSRV:LGSERVER-AUTH
APP:CA:ARCSRV:METHOD-EXPOSURE
APP:CA:ARCSRV:UNICENTERAGENT-OF
APP:CA:ARCSRV:RPC-TAPE-ENG
APP:CA:ARCSRV:BCK-MSG
APP:CA:ARCSRV:CAMEDIASRV-UDP
APP:CA:ARCSRV:CALOGGERD-BO
APP:CA:ARCSRV:HSM-OF
APP:CA:ARCSRV:GWT-INFO-DISC
APP:CA:ARCSRV:TCP-BOF
APP:CA:ARCSRV:TAPE-ENGINE-DOS
APP:CA:ARCSRV:LGSERVER-AUTH-USR
APP:CA:ARCSRV:XDR-PARSING-BO
APP:CA:ARCSRV:LGSERVER-HSHAKE
APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS
APP:CA:ARCSRV:BCKUP-AUTHSRV-CE
APP:CA:ARCSRV:MAILSLOT-OF
APP:CA:ARCSRV:MOBILE
APP:CA:ARCSRV:PORTMAPPER
APP:CA:ARCSRV:D2D-AXIS2-RCE
APP:CA:ARCSRV:FILE-UPLOAD
APP:CA:ARCSRV:UA-OF
APP:CA:ARCSRV:DIRTRAV
APP:CA:ARCSRV:CAMEDIASRV
APP:CA:ARCSRV:LG-SERVER-RCE

APP:CISCO

APP:CISCO:ACS-FS
APP:CISCO:REGISTRAR-AUTH-BYPASS
APP:CISCO:NX-OS-PRIV-ESC
APP:CISCO:CNS-NETWORK-DOS
APP:CISCO:LAN-MGMT-SOL-RCE
APP:CISCO:ACS-OF
APP:CISCO:FW-SCCP-DOS
APP:CISCO:VIDEO-SURVEILANCE-LFI
APP:CISCO:VIDEO-SURVEILANCE-XSS
APP:CISCO:SECUREACS-AUTH-BYPASS

APP:CITRIX

APP:CITRIX:AGENT-OF
APP:CITRIX:AGENT-OF-2
APP:CITRIX:AG-CMD-INJ
APP:CITRIX:IMA-BO
APP:CITRIX:META-IMA-AUTH
APP:CITRIX:STEAM-OF
APP:CITRIX:PROVISIONING-OPCODE
APP:CITRIX:STREAMPROCESS-BOF
APP:CITRIX:PROVISIONINGSERV-UF
APP:CITRIX:XENAPP-XML-RCE
APP:CITRIX:NSEPACOM-BOF

APP:CUPS

APP:CUPS:APPLE-DOSELECT
APP:CUPS:CUPS-JOBS-EXP
APP:CUPS:COMMAND-CHAR
APP:CUPS:HPGL-PC-OF
APP:CUPS:CGI-ADMIN-OF
APP:CUPS:TEXTTOPS-OF
APP:CUPS:GIF-READ-LZW-OF
APP:CUPS:JBIG2-SYMBOLDICTIONARY
APP:CUPS:IPP-NULL-PTR-DOS

APP:CVS

APP:CVS:EXCESSIVE-MAX-DOTDOT
APP:CVS:DIR-OVERFLOW
APP:CVS:CVS-FILE-INFO
APP:CVS:CVS-AUTHOR-OF
APP:CVS:ENTRY-TAG-OF
APP:CVS:ARGUMENTX-CMD

APP:ESIGNAL

APP:ESIGNAL:OVERFLOW-EXPLOIT

APP:ETHEREAL

APP:ETHEREAL:TCPDUMP-ISAKMP-DOS
APP:ETHEREAL:NETFLOW-OF
APP:ETHEREAL:3G-A11-B0F
APP:ETHEREAL:TCP-80-DOS
APP:ETHEREAL:DISTCC-OF
APP:ETHEREAL:IGAP-ACCT-OF
APP:ETHEREAL:EIGRP-OF-CLT
APP:ETHEREAL:EIGRP-OF-SVR

APP:EXCHANGE

APP:EXCHANGE:EMSMDB32-DOS

APP:GAME

APP:GAME:CS-S-CONNECT
APP:GAME:CS-CONNECT
APP:GAME:COD4-CONNECT
APP:GAME:XBOX-HTTP-ACCESS
APP:GAME:XBOX-LIVE-MARKETPLACE
APP:GAME:XBOX-DASHBOARD
APP:GAME:XBOX-KERBEROS-LOGIN
APP:GAME:STARDOCK-IMPULSE
APP:GAME:UT3-QUERY
APP:GAME:STEAM-LOGIN
APP:GAME:EAD-LOGIN
APP:GAME:WOW-REALM
APP:GAME:UT2004-QUERY
APP:GAME:WII-ACTIVITY
APP:GAME:STEAM-URI
APP:GAME:DIRECTPLAY-PLAYER-DOS
APP:GAME:DIRECTPLAY-NULL-PTR
APP:GAME:SOURCE-QUERY
APP:GAME:DIABLO3
APP:GAME:WORDS-WITH-FRIENDS
APP:GAME:UNREAL-GAMESPY-QP-BOF
APP:GAME:MEDAL-OF-HONOR-BO
APP:GAME:PS-UPDATE
APP:GAME:XBOX-LIVE
APP:GAME:PS-COMMUNITY
APP:GAME:PS-APPLICATIONS
APP:GAME:PS-CHAT
APP:GAME:DIRECTPLAY-DOS
APP:GAME:WOW-LOGIN

APP:GAUNTLET

APP:GAUNTLET:GAUNTLET-URL-OF

APP:HPOV

APP:HPOV:GETNNMDATA-ICOUNT-OF
APP:HPOV:OID-OF
APP:HPOV:NNM-EVTCOR-CMD-INJ
APP:HPOV:OVALARMSRV-OF
APP:HPOV:DEMANDPOLL-FMT-STR
APP:HPOV:NNM-BO
APP:HPOV:OVALARMSRV-DOS2
APP:HPOV:OVALARMSRV-DOS
APP:HPOV:OVALARMSRV-FMT-STR
APP:HPOV:REQ_SEV_CHANGE-DOS
APP:HPOV:SYS-MGMT-HOMEP-CMD-INJ
APP:HPOV:HPOPSMGT-OF
APP:HPOV:NNM-OVALARM-IO
APP:HPOV:OMNIBACK-II-ACE
APP:HPOV:NNM-OVW-MSG
APP:HPOV:OVTRACE
APP:HPOV:NNM-SNMP-BOF
APP:HPOV:NODE-MGR-NNMRPTCONFIG
APP:HPOV:NNM-RPING-BOF
APP:HPOV:OALARM-LANG-OF
APP:HPOV:OMNIINET-OF
APP:HPOV:UNAUTH-FILE-UPLOAD
APP:HPOV:OVTOPMD-DOS
APP:HPOV:OVJAVALOCALE-OF
APP:HPOV:NNM-RADIA-NOTIFY
APP:HPOV:GETNNMDATA-HOSTNAME-OF
APP:HPOV:NNM-OVLAUNCH-BO
APP:HPOV:REGISTER-FILE-DELETE
APP:HPOV:PERFORMANCE-INSIGHT
APP:HPOV:OPENVMS-FINGER-SRV-BO
APP:HPOV:OPE-AGENT-CODA-BO
APP:HPOV:NNM-HTTP-REQUEST
APP:HPOV:NNMRPTCONFIG-EXE-OF
APP:HPOV:NNMRPTCONG-TEMPL
APP:HPOV:OVDLL-OVBUILDPATH-BOF
APP:HPOV:INT-MGMT-CTR-INFO-DIS
APP:HPOV:NNM-HTTP-OF
APP:HPOV:SNMPVIEWER-APP-OF
APP:HPOV:NNM-OF
APP:HPOV:HP-DPBC-OF
APP:HPOV:NNM-LOGIN-BOF
APP:HPOV:SDP-OF
APP:HPOV:INT-MGMT-CTR-DIRTRAV
APP:HPOV:NNM-SNMP-HOST
APP:HPOV:SDPM-HEAP-BOF
APP:HPOV:NNM-EXECVP-NC-OF
APP:HPOV:GETNNMDATA-MAXAGE-OF
APP:HPOV:HP-DPBC-DIR-TRAV
APP:HPOV:NNM-XSS
APP:HPOV:NNMRPTCONFIG-EXE-RCE
APP:HPOV:OMNILNET-NULL
APP:HPOV:OVWEBSNMPSRV-OF
APP:HPOV:NNM-DISPLAYWIDTH-BOF
APP:HPOV:NNMRPTCONFIG-EXE-BOF

APP:IBM

APP:IBM:DIRECTOR-CIM-DOS
APP:IBM:TIV-SCHEDULEPARAM-XSS
APP:IBM:TME-AGENT
APP:IBM:TIV-DS-IBMSLAPD-EXE
APP:IBM:TSM-SIGN-ON-OF
APP:IBM:TSM-NODE-NAME-OF
APP:IBM:TSM-CLIENT-OF
APP:IBM:INFORMIX-CMD-OF
APP:IBM:IDS-LIBRPC
APP:IBM:TIV-SM-CAD
APP:IBM:TIVOLI-FASTBACK-SER-RCE
APP:IBM:INFORMIX-DBINFO-BOF
APP:IBM:TIVOLI-MAN-HEAP
APP:IBM:LOTUS-NOTES-XSS
APP:IBM:INFORMIX-LIBRPC-DLL-BOF
APP:IBM:TIVOLI-OF
APP:IBM:DOMINO-BYPASS
APP:IBM:BLADECENTER-DOS
APP:IBM:LOTUS-NOTES-HTML-OF
APP:IBM:WCM-XPATH-INJ
APP:IBM:FORMVIEWER-XFDL-BOF
APP:IBM:TIVOLI-PRO-MGR-BO
APP:IBM:SOLIDDB-DOS
APP:IBM:SYS-DIRECTOR-DLL-LOAD
APP:IBM:COGNOS-BACKDOOR
APP:IBM:DB2-KUDDB2-DOS
APP:IBM:DIRECTOR-AGENT-DOS
APP:IBM:BLADECENTER-INFO
APP:IBM:SET-ENVIRONMENT-BOF
APP:IBM:INFORMIX-EXPLAIN
APP:IBM:BLADECENTER-AMM-CSRF
APP:IBM:COGNOS-TM1-BOF
APP:IBM:SYMPHONY-SOAP-BOF

APP:INGRES

APP:INGRES:DB-COMM-SVR-OF

APP:IPSWITCH

APP:IPSWITCH:LOGGING-SVC-DOS
APP:IPSWITCH:IMAIL-FILEDISCLSR
APP:IPSWITCH:WS-FTP-INFO-DISC

APP:KERBEROS

APP:KERBEROS:EXCESSIVE-ERRORS
APP:KERBEROS:GSS-ZERO-TOKEN
APP:KERBEROS:KRB5-MITM-DES
APP:KERBEROS:KBR-DOS-TCP-2
APP:KERBEROS:KPASSWD-UDP-DOS
APP:KERBEROS:XREALM-DOS
APP:KERBEROS:MS-WIN-2000-DOMAIN
APP:KERBEROS:DOS-TCP
APP:KERBEROS:DBLFREE
APP:KERBEROS:KRB5-DOS
APP:KERBEROS:DBLFREE-2
APP:KERBEROS:DOS
APP:KERBEROS:KDC-NULL-DOS
APP:KERBEROS:MIT-KRB5-DOS
APP:KERBEROS:PREP-REPROCESS-REQ
APP:KERBEROS:KDC-AUTH-DOS
APP:KERBEROS:MULTI-REALM-DOS
APP:KERBEROS:XREALM-KDC-DOS
APP:KERBEROS:MS-KERB-ASN-BIT

APP:MDAEMON

APP:MDAEMON:MDCONFIG-VER
APP:MDAEMON:FORM2RAW-OF
APP:MDAEMON:SEND-OF
APP:MDAEMON:LIST-OF

APP:MISC

APP:MISC:OP5-APP-TIMESTAMP
APP:MISC:TANNE-FMT-STR
APP:MISC:KADMIN-4-OF
APP:MISC:ACTFAX-BO
APP:MISC:PIGEON-DOS
APP:MISC:CITADEL-BO
APP:MISC:ACROREAD-XML-URL
APP:MISC:DOMINO-MGR-FS
APP:MISC:AVIRA-ANTIVIR
APP:MISC:OP5-APP-PASSWORD
APP:MISC:GITORIOUS-RCE
APP:MISC:MCAFEE-EPOL-ORCH
APP:MISC:HP-MERCURY-BOF
APP:MISC:NETVAULT-SD-DOS
APP:MISC:GUESTBOOK-CGI
APP:MISC:UNISYS-BIS
APP:MISC:HEARTBEAT-OF
APP:MISC:SAMSUNG-TV-SERVER-DOS
APP:MISC:GOOGLE-EARTH
APP:MISC:PXESERVICE-UDP
APP:MISC:ESIGNAL-WINSIG-BO
APP:MISC:REALITYSERVER-DOS
APP:MISC:ZABBIX-AGENT-RCE
APP:MISC:DOGFOOD-RCE
APP:MISC:UPLUS-FTP-WEB-OF
APP:MISC:SPREE-SEARCH-CMD-EXE
APP:MISC:ACTFAX-BO-HTTP
APP:MISC:GANGLIA-METE-BOF
APP:MISC:AVAYA-WINPDM
APP:MISC:AVID-MEDIA-OF
APP:MISC:OPC-SYSTEMS-NET-DOS
APP:MISC:ZABBIX-SQLI
APP:MISC:PSI-INTEGER-OF-DOS
APP:MISC:NERO-MEDIAHOME-DOS
APP:MISC:CYBERLINK-POWERDVD-DOS
APP:MISC:SIEMENS-SE461-DOS
APP:MISC:BOPUP-COMMUNICATION-BO
APP:MISC:HP-DIAGNOSTICS-INT
APP:MISC:QUEST-NETVAULT-DOS
APP:MISC:F-SECURE-WEB-BO
APP:MISC:HP-OA-HEALTH-BO
APP:MISC:HP-SITESCOPE-DIR-TRAV
APP:MISC:HP-SITESCOPE-LOADFILE
APP:MISC:LCDPROC-TEST-FUNC-FS
APP:MISC:SYNERGY-CLPBRD-OF
APP:MISC:CNTWR-FV-GIF-LZWMCS-MC
APP:MISC:NAGIOS-NRPE-CE
APP:MISC:SCHNEIDER-ACCUTECH-B0
APP:MISC:YEALINK-IP-PHONE-CSRF
APP:MISC:AUTONOMY-CONN-TYPE-13
APP:MISC:REDHAT-JBOSS-JNDI
APP:MISC:ZEND-XMLRPC-INFO-DISC
APP:MISC:HP-SITESCOPE-SOAP
APP:MISC:EMC-AUTOSTART-NULLBYTE
APP:MISC:ENTERASYS-NETSIGHT-BOF
APP:MISC:JRE-PACK200-OF
APP:MISC:LCDPROC-BOF
APP:MISC:D-LINK-SEC-BYPASS
APP:MISC:YEALINK-IP-PHONE-BO
APP:MISC:BIGANT-DDNF-BO
APP:MISC:SAP-NETWEAVER-SOAP-RCE
APP:MISC:HP-SITESCOPE-CE
APP:MISC:HICP-HOSTNAME
APP:MISC:SOPHOS-WEBAPP-RCE
APP:MISC:HP-IPMI-AUTH-BYPASS
APP:MISC:HP-INODE-BO
APP:MISC:HP-DATA-PROTECTOR-TRAV
APP:MISC:ZIMBRA-COLLAB-INFODISC
APP:MISC:HP-SSC-APIMONITORIMPL
APP:MISC:MS-ACTIVE-DIR-RCE

APP:NOVELL

APP:NOVELL:IMANAGER-TREE-NAME
APP:NOVELL:ZENWORKS-TFTPD-RCE
APP:NOVELL:REPORTER-AGENT-BOF
APP:NOVELL:GRPWISE-HOST-RCE
APP:NOVELL:MESSENGER-DOS
APP:NOVELL:GROUPWISE-WA
APP:NOVELL:HTTP-NOVELL-REDIRECT
APP:NOVELL:EDIRECTORY-DOS
APP:NOVELL:ZENWORKS-MSG-DLL-OF
APP:NOVELL:EDIR-PLUGIN-OF
APP:NOVELL:EDIR-HEADER-DOS
APP:NOVELL:IMONITOR-OF
APP:NOVELL:REPORTER-AGENT
APP:NOVELL:IMANAGER-CREATE-BO
APP:NOVELL:NETWARE-XNFS-BO
APP:NOVELL:IMANAGER-FILE-UPLOAD
APP:NOVELL:ZENWORKS-LG-DIR-TRAV
APP:NOVELL:EDIRECTORY-ME-OF
APP:NOVELL:ZENWORKS-FHIPCND-EXE
APP:NOVELL:DIS-PRINT-SRV
APP:NOVELL:ZENWORKS-MGMT-DIR
APP:NOVELL:ZENWORKS-MGT-UPLOAD
APP:NOVELL:RECORD-TAG-BOF
APP:NOVELL:NDS-IO
APP:NOVELL:IMANAGER-ARB-UPLOAD
APP:NOVELL:EDIR-CONTENT-LEN-OF
APP:NOVELL:INTERNET-AGENT-BOF
APP:NOVELL:REPORTER-SRS
APP:NOVELL:REPORTER-VOL
APP:NOVELL:GROUPWISE-ADDRESS
APP:NOVELL:GROUPWISE-CLIENT-BO
APP:NOVELL:NMAP-NETMAIL-STOR
APP:NOVELL:XNFS-NLM
APP:NOVELL:GWIA-RRULE-BO
APP:NOVELL:NETWARE-XNFS-NLM-2
APP:NOVELL:NETWARE-XNFS-NLM
APP:NOVELL:NETWARE-XNFS-NLM-1
APP:NOVELL:GROUPWISEIA-ICAL-DOS
APP:NOVELL:GWMGR-INFODISC
APP:NOVELL:ZENWORKS-MOBILE-LFI
APP:NOVELL:NETIQ-EDIR-BOF
APP:NOVELL:MSNGR-CREATESEARCH
APP:NOVELL:MESSENGER-LOGIN
APP:NOVELL:ZENWORKS-CONFMGR-BO
APP:NOVELL:IPRINT-ATTRIB-BO
APP:NOVELL:REMOTE-MGR-DOS
APP:NOVELL:ZENWORKS-AGENT-OF
APP:NOVELL:MESSENGER-SERVER-BOF
APP:NOVELL:MESSENGER-BOF
APP:NOVELL:ZENWORKS-CONTENT-LEN
APP:NOVELL:CASA-PAM-BOF
APP:NOVELL:REPORTER-FSFUI
APP:NOVELL:GWCLIENT-BOF
APP:NOVELL:ZENWORKS-PREBOOT-SVC
APP:NOVELL:GROUPWISE-MAILTO-BO
APP:NOVELL:ZENWORKSCM-DIRTRVRSL
APP:NOVELL:GROUPWISE-ADDRESSBK
APP:NOVELL:ZENWORKS-ZFHIPCND-OF
APP:NOVELL:ZENWORKS-DIR-TRVRS
APP:NOVELL:NLM-NOTIFY
APP:NOVELL:NLM-RENAME

APP:ORACLE

APP:ORACLE:WEBLOGIC-CMD-EXEC
APP:ORACLE:WEBUI-CMD-INJ
APP:ORACLE:WEBCACHE-INSECURE2
APP:ORACLE:BUSINESS-FLSHSVC-RCE
APP:ORACLE:OUTSIDE-IN-FLASHPIX
APP:ORACLE:WEBCACHE-INSECURE
APP:ORACLE:REPORT-CMD-INJ
APP:ORACLE:WEBCACHE-METHOD-OF
APP:ORACLE:OUTSIDE-JPEG2-CODCOC
APP:ORACLE:RHINOSCRIPT-BYPASS
APP:ORACLE:VIRTUAL-AGENT-CMDINJ
APP:ORACLE:SBAS-AUTH-BYPASS
APP:ORACLE:JAVA-RMI-RCE
APP:ORACLE:SQL-QUERY-DIR-TRAV
APP:ORACLE:VIRTUAL-AGT-CMDIJ-HS
APP:ORACLE:MEMCACHED-PLUGIN
APP:ORACLE:OUTSIDEIN-MET-HOVF
APP:ORACLE:SECURE-BACKUP-INJ
APP:ORACLE:GOLDENGATE-SOAP-OF
APP:ORACLE:OUTSIDE-JPEG2-CRG
APP:ORACLE:OOXML-TAG
APP:ORACLE:CLNT-SYS-ANLZR-FL-UP
APP:ORACLE:APP-FRAME-DEV-MODE
APP:ORACLE:OHS-PROXY-BYPASS

APP:PCANYWHERE

APP:PCANYWHERE:LOGIN-ADMIN
APP:PCANYWHERE:LOGIN-FAILURE
APP:PCANYWHERE:STARTUP
APP:PCANYWHERE:HOST-SERVICES
APP:PCANYWHERE:SERVER-DOS
APP:PCANYWHERE:LOGIN-PASSWD-BO

APP:PPTP

APP:PPTP:PPTP-UNK-CTRL
APP:PPTP:POPTOP-OF
APP:PPTP:MICROSOFT-PPTP

APP:PROXY

APP:PROXY:SQUID-HOST-HDR-BYPASS
APP:PROXY:SQUID-WCCP-DOS
APP:PROXY:SQUID-ACCEPT-LANG-DOS
APP:PROXY:SQUID-PROXY-CACHE
APP:PROXY:SQUID-WCCP-BO

APP:QT-SERVER

APP:QT-SERVER:DESCRIBE-DOS
APP:QT-SERVER:DEV-URL-DOS
APP:QT-SERVER:PARSE-XML-CGI-RCE

APP:REAL

APP:REAL:PLAYER-SMIL-OF
APP:REAL:NEG-CONT-LEN
APP:REAL:SERVER-DOS
APP:REAL:MAL-FLV-FILE
APP:REAL:RAM-FILE-OF
APP:REAL:PLAYER-MAL-META-FILE
APP:REAL:PLAYER-FORMAT-STRING
APP:REAL:IVR-OF
APP:REAL:VIDPLIN-DLL
APP:REAL:REALTEXT-ERR-OF
APP:REAL:REAL-MPG-WIDTH
APP:REAL:HELIX-URL-OF
APP:REAL:SMIL-WALLCLOCK-OF
APP:REAL:PLAYER-AU-FILE-DOS
APP:REAL:RMP-BO
APP:REAL:PLAYER-INVALID-CHUNK
APP:REAL:HTML-PARSING-DOS
APP:REAL:PLAYER-FILE-SEC-BYPASS
APP:REAL:RMP-FILE-OF
APP:REAL:HELIX-NTLM-OF
APP:REAL:IVR-OF-1
APP:REAL:PLAYER-MAL-SKIN

APP:REMOTE

APP:REMOTE:TEAMVIEWER-URL-MODE
APP:REMOTE:TEAMVIEWER-HTTP
APP:REMOTE:TEAMVIEWER
APP:REMOTE:LOGMEIN
APP:REMOTE:RDP-CONNECT
APP:REMOTE:TIMBUKTU-CONNECT
APP:REMOTE:GOTOMYPC-CONN-TEST
APP:REMOTE:GOTOMYPC
APP:REMOTE:RDP-HEAP-OF
APP:REMOTE:TIMBUKTU-AUTH-OF
APP:REMOTE:NETTRANSPORT-DM
APP:REMOTE:RDP-DOS
APP:REMOTE:MS-WIN-RDP-RCE
APP:REMOTE:MS-RDP-ACTIVEX-RCE
APP:REMOTE:RDP-RCE
APP:REMOTE:RDP-MEM-OBJ

APP:RWHOISD

APP:RWHOISD:RWHOISD-FS

APP:SAP

APP:SAP:NETWEAVER-DOS
APP:SAP:NETWEAVER-DIAGI-DOS
APP:SAP:WEBAPP-SERV-XSS
APP:SAP:IGS-OF
APP:SAP:WEBAS-DOS
APP:SAP:WEB-SRV-OF
APP:SAP:NETWEAVER-SOAP-RCE
APP:SAP:MSG-SRV-GRP
APP:SAP:BIS-LIC-MGR-BOF
APP:SAP:NETWEAVER-BO
APP:SAP:NETWEAVER-MSG-RCE
APP:SAP:NETWEAVER-MSG-SERVER-B0

APP:SHOUTCAST

APP:SHOUTCAST:ICY-OVERFLOW

APP:SNORT

APP:SNORT:GARBAGE-PACKET
APP:SNORT:DCE-RPC-DOS
APP:SNORT:BACKORIFICE-BOF
APP:SNORT:REPORT-RCE
APP:SNORT:BACKORIFICE-DOS

APP:SOCKS

APP:SOCKS:SMTP-PROXY-HTTP

APP:SYMC

APP:SYMC:AMS-MODEM-STRING-OF
APP:SYMC:XFERWAN-OF
APP:SYMC:WORKSPACE-RCE
APP:SYMC:LUA-HTML-INJ
APP:SYMC:AV-INTEL-ALERT
APP:SYMC:AV-AHS-DOS
APP:SYMC:AMS-SEND-ALERT-ACK-OF
APP:SYMC:AV-MGT-SVC-BOF
APP:SYMC:VRTSWEB-EXEC
APP:SYMC:MESSAGING-SSH-PASSWORD
APP:SYMC:WEB-GATEWAY-CSRF
APP:SYMC:VERITAS-VXSVC-BO
APP:SYMC:ALERT-MGT-FILE-TRNS
APP:SYMC:BLOCKED-PHP-SQLI
APP:SYMC:IM-MGR-ADM-INJ
APP:SYMC:AMS-PIN-OF
APP:SYMC:ALERT-MGT
APP:SYMC:EASYSETUP-ACTIVEX
APP:SYMC:NETBACKUP-CMD-EXEC
APP:SYMC:MESSAGING-SAVE.DO-CSRF
APP:SYMC:LUA-HTML-INJ-TEST
APP:SYMC:BACKUP-EXEC
APP:SYMC:WG-PBCONTROL
APP:SYMC:WEB-GATEWAY-OS-CMD-INJ
APP:SYMC:WEB-GW-PWD-CHG
APP:SYMC:SCAN-ENG-AUTH-BYPASS
APP:SYMC:MESSAGING-DIR-TRAV
APP:SYMC:IM-MGR-INJ
APP:SYMC:IM-MGR-WEB-UI-INJ
APP:SYMC:AMS-HNDLRSVC-RCE
APP:SYMC:AGENT-RM-CMD
APP:SYMC:ALTIRIS-DS-SQL-INJ

APP:TMIC

APP:TMIC:SP-EARTHAGENT-OF
APP:TMIC:SP-CREATEBIND-OF
APP:TMIC:CTRLMGR-CHUNKED
APP:TMIC:INTERSCAN-XSS
APP:TMIC:TMREGCHANGE
APP:TMIC:OFFICESCAN-AUTH
APP:TMIC:CONTROL-MANAGER-CMD
APP:TMIC:OFFICESCAN-PW-OF

APP:TUN

APP:TUN:TOR-2
APP:TUN:TOR-1
APP:TUN:TOR-3
APP:TUN:6TO4-TUNNEL
APP:TUN:ESP-TUNNEL
APP:TUN:GPRS-TUNNEL
APP:TUN:TEREDO-TUNNEL
APP:TUN:TIC-LOGIN
APP:TUN:GRE-TUNNEL
APP:TUN:ANCHORFREE-VPN-UDP
APP:TUN:TEREDO-INFO
APP:TUN:PACKETIX-VPN-CONNECT
APP:TUN:IPV6-OVER-IPV4
APP:TUN:ANCHORFREE-VPN-SSL
APP:TUN:ANCHORFREE-VPN-TCP
APP:TUN:ESP-OVER-UDP
APP:TUN:TOR-EXIT-HOSTHEADER

APP:UPNP

APP:UPNP:MS-UPNP
APP:UPNP:APPLE-MDNS
APP:UPNP:MINIUPNPD-DOS
APP:UPNP:LIBUPNP-ROOT-DSN-BOF
APP:UPNP:LIBUPNP-UUID-BOF
APP:UPNP:LIBUPNP-DSN-BOF
APP:UPNP:DLINK-SEARCH-NOTIFY

APP:VERITAS

APP:VERITAS:NB-VMD-OF2
APP:VERITAS:REG-WRITE
APP:VERITAS:VERITAS-FILE-DUMP
APP:VERITAS:COMMAND-CHAIN
APP:VERITAS:NETBACKUP-VNETD
APP:VERITAS:NETBACKUP-BPCD
APP:VERITAS:NB-VMD-OF
APP:VERITAS:AGENT-NAME-OF
APP:VERITAS:VERITAS-NULL-PTR
APP:VERITAS:MAL-REQUEST-DOS
APP:VERITAS:NETBACKUP-FS
APP:VERITAS:MAL-REQUEST-DOS-2
APP:VERITAS:CLIENT-AUTH-OF
APP:VERITAS:NETBCKP-CMD-EXEC

APP:WHATSUP

APP:WHATSUP:IPSWITCH-DIR-TRV

APP:WINAMP

APP:WINAMP:CDA-DEV-NAME-OF
APP:WINAMP:CAF-OF
APP:WINAMP:MP4-MC
APP:WINAMP:RIFF-INFO
APP:WINAMP:AVI-STREAM
APP:WINAMP:AMF-BO
APP:WINAMP:MIDI-FILE-OF

APP:WMP

APP:WMP:DSHOW-BIGCHUNK-SMB
APP:WMP:DSHOW-BIGCHUNK-SMTP
APP:WMP:DSHOW-BIGCHUNK-HTTP

APP:XDMCP

APP:XDMCP:DTLOGIN-DBL-FREE

CHARGEN

CHARGEN:ECHO-DOS
CHARGEN:TRAFFIC

CHARGEN:EXPLOIT

CHARGEN:EXPLOIT:UNEXPECTED-REQ

CHAT

CHAT:OOVOO-ACTIVITY
CHAT:POPO-CHAT-LOGIN
CHAT:STEAM-FRIENDS
CHAT:APPLE-IMESSAGE-CONNECTION
CHAT:MS-LYNC-2010-CE

CHAT:AIM

CHAT:AIM:FILE-EXE
CHAT:AIM:CLOSE-CONNECTION
CHAT:AIM:MESSAGE-RECEIVE
CHAT:AIM:MESSAGE-SEND
CHAT:AIM:LOGIN-ATTEMPT
CHAT:AIM:SERVER-READY
CHAT:AIM:FILE-SEND
CHAT:AIM:LINK-EXEC
CHAT:AIM:FILE-GET
CHAT:AIM:HTTP-PROXY
CHAT:AIM:TUNNEL
CHAT:AIM:TOC
CHAT:AIM:HTTPS-LOGIN

CHAT:AIM:OVERFLOW

CHAT:AIM:OVERFLOW:AWAY-FS
CHAT:AIM:OVERFLOW:TRILIN-XML-BO
CHAT:AIM:OVERFLOW:TRILLIAN-XML
CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY

CHAT:AUDIT

CHAT:AUDIT:IRC-CMD
CHAT:AUDIT:IRC-CMD-CHR

CHAT:AUDIT:AIM

CHAT:AUDIT:AIM:INV-TLV-LEN
CHAT:AUDIT:AIM:MSG-TOO-SHORT
CHAT:AUDIT:AIM:INVALID-TLV
CHAT:AUDIT:AIM:MSG-TOO-BIG
CHAT:AUDIT:AIM:MSG-HEADER
CHAT:AUDIT:AIM:TLV-LEN-OVFLW

CHAT:AUDIT:MSN

CHAT:AUDIT:MSN:URL
CHAT:AUDIT:MSN:MSN-USER-NAME
CHAT:AUDIT:MSN:PHONE-NUM
CHAT:AUDIT:MSN:MSG
CHAT:AUDIT:MSN:GROUP-NAME
CHAT:AUDIT:MSN:CMD
CHAT:AUDIT:MSN:USER-STATE
CHAT:AUDIT:MSN:IP-PORT
CHAT:AUDIT:MSN:MSG-2LONG

CHAT:AUDIT:YMSG

CHAT:AUDIT:YMSG:BUD-LST
CHAT:AUDIT:YMSG:ACTIVITY-SIZE
CHAT:AUDIT:YMSG:BUD-NAME
CHAT:AUDIT:YMSG:CHATRM-MSG
CHAT:AUDIT:YMSG:FILE-NAME
CHAT:AUDIT:YMSG:OFLOW-PASSWD
CHAT:AUDIT:YMSG:OFLOW-COOKIE
CHAT:AUDIT:YMSG:DATA-TYPE
CHAT:AUDIT:YMSG:VALUE
CHAT:AUDIT:YMSG:ACTIVITY
CHAT:AUDIT:YMSG:MEMBER-NAME
CHAT:AUDIT:YMSG:BUD-LIST
CHAT:AUDIT:YMSG:MAIL-SUBJECT
CHAT:AUDIT:YMSG:MSG-TOO-BIG
CHAT:AUDIT:YMSG:INV-GROUP-NAME
CHAT:AUDIT:YMSG:OFLOW-GRP-NAME
CHAT:AUDIT:YMSG:INV-STAT-CODE
CHAT:AUDIT:YMSG:EVENT-CODE
CHAT:AUDIT:YMSG:BUDY-LIST
CHAT:AUDIT:YMSG:CHALLENGE
CHAT:AUDIT:YMSG:CONF-NAME
CHAT:AUDIT:YMSG:MAIL-SNDR-NAME
CHAT:AUDIT:YMSG:CONF-INVIT
CHAT:AUDIT:YMSG:CHATROOM-NAME
CHAT:AUDIT:YMSG:CRYPT-PASSWD
CHAT:AUDIT:YMSG:CONTACT-NAME
CHAT:AUDIT:YMSG:MAIL-SNDR-ADDR
CHAT:AUDIT:YMSG:CONF-MSG
CHAT:AUDIT:YMSG:GROUP-NAME
CHAT:AUDIT:YMSG:USERNAME
CHAT:AUDIT:YMSG:STATUS-CODE
CHAT:AUDIT:YMSG:USER-NAME
CHAT:AUDIT:YMSG:URL
CHAT:AUDIT:YMSG:MSG-SIZE
CHAT:AUDIT:YMSG:OFLOW-URL
CHAT:AUDIT:YMSG:OFLOW-RESP-CRPT
CHAT:AUDIT:YMSG:RECIPIENT
CHAT:AUDIT:YMSG:MSG
CHAT:AUDIT:YMSG:SENDER
CHAT:AUDIT:YMSG:OFLOW-CONF-MSG
CHAT:AUDIT:YMSG:SEPARATOR
CHAT:AUDIT:YMSG:COOKIE
CHAT:AUDIT:YMSG:OFLOW-CONF-NAME
CHAT:AUDIT:YMSG:CHAT-NAME-OF
CHAT:AUDIT:YMSG:WEBCAM-KEY
CHAT:AUDIT:YMSG:CONF-HOST
CHAT:AUDIT:YMSG:OFLOW-CHALNG
CHAT:AUDIT:YMSG:RESP-CRYPT
CHAT:AUDIT:YMSG:MAIL-ADDR
CHAT:AUDIT:YMSG:FILE-SEND
CHAT:AUDIT:YMSG:MESSAGE-SEND
CHAT:AUDIT:YMSG:MESSAGE-RECEIVE
CHAT:AUDIT:YMSG:FILE-SEND-HTTP

CHAT:GADU-GADU

CHAT:GADU-GADU:BANNER
CHAT:GADU-GADU:CLIENT-REQ
CHAT:GADU-GADU:DISCOVER

CHAT:GOOGLE

CHAT:GOOGLE:GTALK-PHONE-SESSION
CHAT:GOOGLE:SEND-HTTP
CHAT:GOOGLE:GTALK-STARTUP
CHAT:GOOGLE:GTALK-CALL
CHAT:GOOGLE:START
CHAT:GOOGLE:TALKGADGET
CHAT:GOOGLE:GTALK-SSL
CHAT:GOOGLE:TALKGADGET-ACTIVITY
CHAT:GOOGLE:JABBER

CHAT:ICQ

CHAT:ICQ:FILE-RECEIVE
CHAT:ICQ:FILE-SEND
CHAT:ICQ:ISS-BLACKICE-OF

CHAT:IRC

CHAT:IRC:SRV-RESPONSE
CHAT:IRC:CC-NUMBER
CHAT:IRC:SSN-CLEARTEXT
CHAT:IRC:NICK
CHAT:IRC:MIRC-PRIVMSG
CHAT:IRC:UNREALRCD-BACKDOOR
CHAT:IRC:LOIC-HIVE-LOGIN
CHAT:IRC:RATBOX-MCAPAB-DOS
CHAT:IRC:COLLOQUY-DOS
CHAT:IRC:COLLOQUY-INVITE-FS

CHAT:IRC:BOTNET

CHAT:IRC:BOTNET:AGOBOT-CMD
CHAT:IRC:BOTNET:DOWNLOAD-CMD
CHAT:IRC:BOTNET:SDBOT-CMD

CHAT:IRC:INVALID

CHAT:IRC:INVALID:ARGS
CHAT:IRC:INVALID:PREFIX
CHAT:IRC:INVALID:MSG
CHAT:IRC:INVALID:NUM-REPLY
CHAT:IRC:INVALID:NULL-CHAR
CHAT:IRC:INVALID:FORMAT-STR

CHAT:IRC:OVERFLOW

CHAT:IRC:OVERFLOW:USERNAME
CHAT:IRC:OVERFLOW:LINE
CHAT:IRC:OVERFLOW:NICK
CHAT:IRC:OVERFLOW:PASSWORD
CHAT:IRC:OVERFLOW:CHANNEL
CHAT:IRC:OVERFLOW:NUM-REPLY
CHAT:IRC:OVERFLOW:XCHAT-SOCKS
CHAT:IRC:OVERFLOW:OPENBSD-DOS

CHAT:JABBER

CHAT:JABBER:JABBER-CTRAF
CHAT:JABBER:UNAME-OF
CHAT:JABBER:JABBER-XTRAF
CHAT:JABBER:NIMBUZZ

CHAT:MSN

CHAT:MSN:POINT-TO-POINT
CHAT:MSN:ACCESS
CHAT:MSN:INVITE-SEND
CHAT:MSN:LOGIN-ATTEMPT
CHAT:MSN:INVITE-RECV
CHAT:MSN:BRIDGE
CHAT:MSN:GIF-OVERFLOW
CHAT:MSN:PIDGIN-MSN-IO

CHAT:MSN:HTTP

CHAT:MSN:HTTP:LOGIN
CHAT:MSN:HTTP:CHAT
CHAT:MSN:HTTP:CALL
CHAT:MSN:HTTP:MSNFTP-INVITE

CHAT:MSN:INVALID

CHAT:MSN:INVALID:PNG-WIDTH
CHAT:MSN:INVALID:MSN-VID-FRAME
CHAT:MSN:INVALID:PNG-HEIGHT

CHAT:QQ

CHAT:QQ:QQ-CONNECT-TCP
CHAT:QQ:QQ-CONNECT

CHAT:YIM

CHAT:YIM:XSS
CHAT:YIM:HTTP-TUNNEL
CHAT:YIM:HTTP-FILE-TRANSFER
CHAT:YIM:FILE-TRANSFER
CHAT:YIM:YAHOO-HTTP-PROXY
CHAT:YIM:LONG-FILE-NAME
CHAT:YIM:DOUBLE-EXT
CHAT:YIM:LOGIN-ATTEMPT

CHAT:YIM:OVERFLOW

CHAT:YIM:OVERFLOW:SPOOFED-NAME

DB

DB:BORLAND-MSG-BO
DB:MONGODB-NATIVEHELPER-RCE
DB:VERSANT-OBJ-ARG-INJ
DB:INGRES-UUID_FROM_CHAR-OF
DB:SOLIDDB-LOG-FS
DB:FIREBIRD-DOS
DB:FIREBIRD-USER-BO
DB:FIREBIRD-XDR-DOS
DB:INGRESDB-IIDBMS-OF
DB:SOLIDDB-DOS
DB:SALESLOGIX-DISC
DB:IBM-SOLIDDB-AUTH-BYPASS
DB:IBM-SOLIDDB-ROWNUM
DB:IBM-SOLIDBD-WHERE-DOS
DB:SAP-MAXDB-SERV-OF
DB:SAPDB-WEB-OF

DB:DB2

DB:DB2:JDBC-OF
DB:DB2:XML-QUERY-OF
DB:DB2:HS-DOS
DB:DB2:CONNECT-DOS
DB:DB2:IBM-DAS-BOF
DB:DB2:SQL-REPEAT-OF
DB:DB2:DB2-DOS
DB:DB2:INVALID-DATA-STREAM-DOS

DB:IB

DB:IB:CONNECT-BOF
DB:IB:MUL-BOF

DB:MS-SQL

DB:MS-SQL:MSSQL-LGN-BRUTE-FORCE
DB:MS-SQL:SQLMON-EMPTY-PKT
DB:MS-SQL:SQLMON-MDAC-OFLOW
DB:MS-SQL:SQLMON-PING-DOS
DB:MS-SQL:PREAUTH-OVERFLOW
DB:MS-SQL:SQLMON-STACK-OFLOW
DB:MS-SQL:NULL-PSWRD
DB:MS-SQL:SQLMON-MALFORM-DOS
DB:MS-SQL:SQLMON-HEAP-OFLOW
DB:MS-SQL:USER-ADD
DB:MS-SQL:XP_CMDSHELL-SMB
DB:MS-SQL:XP_CMDSHELL-TDS
DB:MS-SQL:PWD-CHANGE
DB:MS-SQL:XP-DIRTREE1
DB:MS-SQL:PWD-ENCRYPT
DB:MS-SQL:LOGIN-FAILURE
DB:MS-SQL:TDI-OVERFLOW
DB:MS-SQL:X-RAY-SCANNER
DB:MS-SQL:TDS-FRAG-LEN-ZERO
DB:MS-SQL:SA-LOGIN
DB:MS-SQL:HELLO-OF
DB:MS-SQL:REPLWRITETIVARBIN-MC
DB:MS-SQL:WINCC-DEFAULT-PASS
DB:MS-SQL:REPLWRITETIVARBIN-DB
DB:MS-SQL:MAL-INSERT
DB:MS-SQL:STOR-PROC-PRIV-UPGRD
DB:MS-SQL:2000-SP_START_JOB
DB:MS-SQL:CONVERT-OF
DB:MS-SQL:TDS-FRAG-FLOOD
DB:MS-SQL:INSERT-CMD-BOF
DB:MS-SQL:DOS1

DB:MYSQL

DB:MYSQL:LOGIN-OVERLONG-USER
DB:MYSQL:LOGIN-NO-PSWD
DB:MYSQL:LOGIN-NO-USER
DB:MYSQL:LOGIN-OVERLONG-PSWD
DB:MYSQL:SHORT-MSG
DB:MYSQL:MAXDB-WEB-OF
DB:MYSQL:AUTHENTICATION-BYPASS
DB:MYSQL:MAXDB-WEBDAV-OF
DB:MYSQL:MAXDB-GET-OF
DB:MYSQL:MYSQL-PFIELD-TYPE
DB:MYSQL:MYSQL-PASSWORD-OF
DB:MYSQL:ZERO-LEN-PW
DB:MYSQL:LOGIN-FAILED
DB:MYSQL:ROOT-USER
DB:MYSQL:CREATE-FUNCTION
DB:MYSQL:MS-DOS-NAMES-DOS
DB:MYSQL:AUTH-BYPASS
DB:MYSQL:LONG-FUNC
DB:MYSQL:MYSQL-LDAP-DOS
DB:MYSQL:SINGLE-ROW-DOS
DB:MYSQL:SELECT-SUB-DOS
DB:MYSQL:CREATE-TABLE
DB:MYSQL:YASSL-HELLO-BO
DB:MYSQL:MYSQL-IFDOS
DB:MYSQL:IN-NULL-ARG-DOS
DB:MYSQL:UPDATEXML
DB:MYSQL:LOGIN-INFO-DISCLOSURE
DB:MYSQL:UNIQ-SET-COL-JOIN-DOS
DB:MYSQL:SSL-OF
DB:MYSQL:MYSQL-USE-DOS
DB:MYSQL:COMMANDS-BO
DB:MYSQL:MYSQL-DATE-FS
DB:MYSQL:BENCHMARK-DOS
DB:MYSQL:MAXDB-SERVER-OF
DB:MYSQL:BRUTE-FORCE
DB:MYSQL:WINDOWS-REMOTE-ROOT
DB:MYSQL:WIN-RCE
DB:MYSQL:GRANT-FILE-BO
DB:MYSQL:MOF-EXEC
DB:MYSQL:UPDATEXML-DOS
DB:MYSQL:GEOMETRY-INT-OVF
DB:MYSQL:MAXDB-CMD
DB:MYSQL:FS-REQUEST
DB:MYSQL:COM-FIELD-LIST-BO
DB:MYSQL:PROC-ANALYSE-DOS
DB:MYSQL:USER-ENUMERATION
DB:MYSQL:COMTABLEDUMP-OF
DB:MYSQL:CLIENT-BOF

DB:ORACLE

DB:ORACLE:SDO_CS-TRANS-OF
DB:ORACLE:ORACLE-DSI
DB:ORACLE:VULN-VER-10.1.0.1
DB:ORACLE:VULN-VER-9.2.0.4
DB:ORACLE:INSECURE-TNS-LISTENER
DB:ORACLE:USERNAME-DUMP
DB:ORACLE:APPDET-CONNECT
DB:ORACLE:SDO-CODE-AUTH-BYPASS
DB:ORACLE:SQL-PLUS-LOAD-UIX
DB:ORACLE:REPORTS-XML-DISC
DB:ORACLE:EMANAGEMENT-BOF
DB:ORACLE:SDO_TOPO_DROP_FTBL
DB:ORACLE:ORACLE-SQL-BOF
DB:ORACLE:CREATE-VIEW
DB:ORACLE:DECLARE-EXEC
DB:ORACLE:OSB-NDMP-OF
DB:ORACLE:LOGIN-CMD-INJ
DB:ORACLE:EXP-APP-WEBCACHE
DB:ORACLE:PITRIG-TRUNC-DROP
DB:ORACLE:AS-EMCHARTBEAN-TRAV
DB:ORACLE:COMPILER-ACL
DB:ORACLE:OUTSIDE-IN-XPM-IMG-BO
DB:ORACLE:DBMS-ASSERT
DB:ORACLE:WAREHOUSE-BUILDER
DB:ORACLE:SEARCH-P-GROUPS
DB:ORACLE:WORKSPACE-MGR-INJ
DB:ORACLE:ODCITABLESTART-OF
DB:ORACLE:ISQLPLUS-OF
DB:ORACLE:WEBLOGIC-SERVER
DB:ORACLE:EVTDUMP
DB:ORACLE:LOGIN-BYPASS
DB:ORACLE:TIMES-TEN-HTTP-DOS
DB:ORACLE:XDB-PITRIG-SQLINJ
DB:ORACLE:INVALID-LOGIN
DB:ORACLE:LINK-BOF
DB:ORACLE:ROLLBACKWORKSPACE
DB:ORACLE:METAFILE-PARSER-DOS
DB:ORACLE:FUSION-XLS-IO
DB:ORACLE:DBMS-CDC-PUBLISH-INJ
DB:ORACLE:CREATE_TABLES-INJ
DB:ORACLE:STRCONV-BOF
DB:ORACLE:XDB-DROPMETADATA
DB:ORACLE:XML-SCHEMA-OF
DB:ORACLE:GRANT-TYPE-ACCESS-INJ

DB:ORACLE:DBMS

DB:ORACLE:DBMS:OPMN-LOG-FMT-STR
DB:ORACLE:DBMS:CDC-AQJM-UNSAFE
DB:ORACLE:DBMS:EXP-EXT-UNSAFE
DB:ORACLE:DBMS:EXPORT-PRIV
DB:ORACLE:DBMS:VAL-REMOTE-INJ
DB:ORACLE:DBMS:SUB_NAME-SQL-INJ
DB:ORACLE:DBMS:JVM-EXP-PERMS
DB:ORACLE:DBMS:OUTPUT-TO-JAVA
DB:ORACLE:DBMS:EXPORT-EXTENSION
DB:ORACLE:DBMS:AQELM-OF
DB:ORACLE:DBMS:CORE-DOS
DB:ORACLE:DBMS:METADATA-UNSAFE

DB:ORACLE:PASSWD

DB:ORACLE:PASSWD:ADAMS
DB:ORACLE:PASSWD:BLAKE
DB:ORACLE:PASSWD:CTXSYS
DB:ORACLE:PASSWD:SCOTT
DB:ORACLE:PASSWD:CLARK
DB:ORACLE:PASSWD:SYSTEM
DB:ORACLE:PASSWD:SYS
DB:ORACLE:PASSWD:ORDPLUGINS
DB:ORACLE:PASSWD:OUTLN
DB:ORACLE:PASSWD:ORDSYS
DB:ORACLE:PASSWD:JONES
DB:ORACLE:PASSWD:TRACESVR
DB:ORACLE:PASSWD:ORDCOMMON
DB:ORACLE:PASSWD:AURORA
DB:ORACLE:PASSWD:MDSYS
DB:ORACLE:PASSWD:DBSNMP

DB:ORACLE:SYS

DB:ORACLE:SYS:KUPW-WORKER
DB:ORACLE:SYS:MDSYS-SDO-LRS
DB:ORACLE:SYS:LT-WORKSPACE
DB:ORACLE:SYS:PBSDE-INIT-OF
DB:ORACLE:SYS:LT-FINDRICSET
DB:ORACLE:SYS:KUPVFT-UNSAFE

DB:ORACLE:TNS

DB:ORACLE:TNS:MALFORMED-PORT
DB:ORACLE:TNS:MALFORMED-IP
DB:ORACLE:TNS:OVERFLOW_MSG
DB:ORACLE:TNS:SHORT_MSG
DB:ORACLE:TNS:UNK-COMMAND
DB:ORACLE:TNS:RDBMS-DOS
DB:ORACLE:TNS:DOS
DB:ORACLE:TNS:OF
DB:ORACLE:TNS:TRACE-OF
DB:ORACLE:TNS:CMD-EXEC
DB:ORACLE:TNS:INTERMEDIA-DOS
DB:ORACLE:TNS:UNSAFE-CMD
DB:ORACLE:TNS:DBMS-OF
DB:ORACLE:TNS:LOOP-DOS
DB:ORACLE:TNS:ORACLE-PRIVESC
DB:ORACLE:TNS:AUTH-SESSKEY
DB:ORACLE:TNS:BEQ-BYPASS
DB:ORACLE:TNS:TABLEFUNC-ASOWN
DB:ORACLE:TNS:SERVICE-AUTH
DB:ORACLE:TNS:ACC-CONTROL-BP
DB:ORACLE:TNS:SERVICE-NAME-OF
DB:ORACLE:TNS:AUTH-SESSKEY-OF
DB:ORACLE:TNS:AUTH-SESSKEY-BOF

DB:POSTGRESQL

DB:POSTGRESQL:CACHEW-OF
DB:POSTGRESQL:SUBSTRING-OF
DB:POSTGRESQL:LINUX-DBLINK-RCE
DB:POSTGRESQL:DBA-AUTH-BYPASS
DB:POSTGRESQL:DBNAME-CLIFLAGINJ
DB:POSTGRESQL:GEO-OPS-PATH-IN

DB:SYBASE

DB:SYBASE:OPEN-SERVER-MC
DB:SYBASE:OPEN-SERVER-CE
DB:SYBASE:MOBILINK-BO

DDOS

DDOS:JAVALOIC-TWITTER
DDOS:LOIC-UDP-METHOD
DDOS:LOIC-TCP-METHOD
DDOS:HOIC-HTTP-METHOD
DDOS:DIRTJUMPER
DDOS:LONGCAT
DDOS:LOIC-WEB
DDOS:JAVALOIC-TCP-METHOD
DDOS:LOIC-HTTP-METHOD
DDOS:JAVALOIC-UDP-METHOD

DDOS:SHAFT

DDOS:SHAFT:CLIENT-TO-HANDLER
DDOS:SHAFT:AGENT-TO-HANDLER
DDOS:SHAFT:AGENT-TO-HANDLER-PKT
DDOS:SHAFT:HANDLER-TO-AGENT

DDOS:TRIN00

DDOS:TRIN00:MASTER-CMD-MPING
DDOS:TRIN00:DAEMON-TO-MSTR2-PKT
DDOS:TRIN00:MASTER-CMD-MDOS
DDOS:TRIN00:MASTERPW-DEF-KDIE
DDOS:TRIN00:MASTERPW-DEF-STRTUP
DDOS:TRIN00:DAEMON-TO-MSTR1-PKT
DDOS:TRIN00:DAEMON-CMD-SHI
DDOS:TRIN00:MASTER-PROMPT
DDOS:TRIN00:MASTER-CMD-KILLDEAD
DDOS:TRIN00:DAEMON-TO-MASTER-2
DDOS:TRIN00:MASTERPW-DEF-REMOTE
DDOS:TRIN00:MASTER-CMD-MDIE
DDOS:TRIN00:DAEMON-TO-MASTER-1
DDOS:TRIN00:MASTER-CMD-DOS
DDOS:TRIN00:DAEMON-CMD-XYZ
DDOS:TRIN00:MASTER-CMD-MSIZE
DDOS:TRIN00:MASTERPW-DEFLT-WIN
DDOS:TRIN00:DAEMON-CMD

DDOS:TRINITY

DDOS:TRINITY:DEFAULT-PW

DHCP

DHCP:ISC-ZERO-LEN-DOS

DHCP:AUDIT

DHCP:AUDIT:UNK-HW-TYPE
DHCP:AUDIT:INV-SVR-SRC-PORT
DHCP:AUDIT:SVRNAME-NOT-T2
DHCP:AUDIT:UNK-OPCODE
DHCP:AUDIT:CLI-HW-MISMATCH
DHCP:AUDIT:INV-CLI-SRC-PORT
DHCP:AUDIT:BOOT-FNAME-NOT-T2
DHCP:AUDIT:MISS-MAGIC-COOKIE
DHCP:AUDIT:CLI-HWADDR-NOT-T2

DHCP:ERROR

DHCP:ERROR:INV-MAGIC-COOKIE
DHCP:ERROR:INV-MSG-TYPE
DHCP:ERROR:INV-HW-LEN

DHCP:EXPLOIT

DHCP:EXPLOIT:MSG-TOO-SHORT
DHCP:EXPLOIT:HOSTNAME-HTML
DHCP:EXPLOIT:SOLARIS-EXEC

DHCP:OPT

DHCP:OPT:MAX-MSG-SIZE-2-SMALL
DHCP:OPT:IFMTU-TOO-SMALL
DHCP:OPT:INV-NB-NODE-TYPE
DHCP:OPT:INV-OPT-VAL
DHCP:OPT:LEASE-TIME-ZERO
DHCP:OPT:DEF-TTL-ZERO
DHCP:OPT:MAX-DGM-SZ-2-SMALL
DHCP:OPT:BAD-HOSTNAME
DHCP:OPT:MISSING-EOO
DHCP:OPT:INV-OPT-LEN
DHCP:OPT:TCP-DEF-TTL-ZERO
DHCP:OPT:LOG-BUF-OVERFLOW
DHCP:OPT:ISC-DHCPD-MMS-DOS
DHCP:OPT:DHCPD-PKT-SIZE-BO
DHCP:OPT:MS-OPT-OF

DHCP:SERVER

DHCP:SERVER:FMT-STR
DHCP:SERVER:ISC-FORMAT-STRING
DHCP:SERVER:ISC-DISCOVER-DOS
DHCP:SERVER:ISC-CMD-INJ
DHCP:SERVER:ISC-MAL-CLID
DHCP:SERVER:ISC-DUID-BO
DHCP:SERVER:ISC-DHCLIENT-BOF
DHCP:SERVER:ISC-PACKET-DOS
DHCP:SERVER:ISC-DHCPD-BO

DISCARD

DISCARD:TRAFFIC

DISCARD:EXPLOIT

DISCARD:EXPLOIT:UNEXPECTED-REP

DISCARD:INFO

DISCARD:INFO:ASCEND-DISCARD

DNS

DNS:TOO-MANY-ERRORS
DNS:BIND-NXT-OVERFLOW1
DNS:BIND-NXT-OVERFLOW4
DNS:WPADREG
DNS:BIND-NXT-OVERFLOW3
DNS:BIND-NXT-OVERFLOW2
DNS:MS-ANY-QUERY-SPOOFING
DNS:ISC-BIND-RRSIG-DOS
DNS:RRSIG-QUERY
DNS:TRAFFIC-TCP
DNS:TRAFFIC-UDP
DNS:DYNAMICUPDATE
DNS:BIND-RRSIG-QUERY-DOS
DNS:MAILENABLE-SPF
DNS:BIND9-ASSERT-DOS
DNS:BIND-RRSIG-DOS
DNS:ISC-BIND-REGEX-DOS
DNS:SYMANTEC-DNS-RESPONSE-DOS
DNS:REQUEST-RRTYPE-ANY
DNS:SQUID-DNS-RESPONSE-SPOOF
DNS:RESOLVER-BO
DNS:SYMANTEC-DNS-POISIONING
DNS:GNUTLS-DANE-BOF
DNS:RESP-SPOOF
DNS:MS-FOREFRONT-RCE
DNS:NEGANY
DNS:MICROSOFT-DNS-DOS
DNS:ISATAPREG
DNS:CRAFTED-MX

DNS:AUDIT

DNS:AUDIT:CLASS-NON-IN
DNS:AUDIT:TYPE-EXPERIMENTAL
DNS:AUDIT:INVALID-Z
DNS:AUDIT:TYPE-UNKNOWN
DNS:AUDIT:TYPE-NON-1035
DNS:AUDIT:TYPE-ALL
DNS:AUDIT:CLASS-UNKNOWN
DNS:AUDIT:TYPE-OBSOLETE
DNS:AUDIT:RCODE-FORMAT-ERROR
DNS:AUDIT:RCODE-NAME-ERROR
DNS:AUDIT:RCODE-REFUSED
DNS:AUDIT:INVALID-RCODE
DNS:AUDIT:REQ-INVALID-HDR-RA
DNS:AUDIT:REQ-ANSWERS-IN-QUERY
DNS:AUDIT:REQ-C2S-RESPONSE
DNS:AUDIT:REQ-INVALID-HDR-RD
DNS:AUDIT:QCLASS-UNEXP
DNS:AUDIT:REP-S2C-QUERY
DNS:AUDIT:MISMATCHING-AN-CNAME
DNS:AUDIT:REP-QTYPE-UNEXPECTED
DNS:AUDIT:OPT-NMB-EXCEEDED
DNS:AUDIT:REP-MISMATCHING-AN
DNS:AUDIT:REP-MISMATCHING-QD
DNS:AUDIT:RCODE-NOT-IMPL
DNS:AUDIT:AAAA-RR
DNS:AUDIT:UNASSIGNED-OPCODE
DNS:AUDIT:Z-RESERVED-OPT

DNS:EXPLOIT

DNS:EXPLOIT:EXPLOIT-BIND9-RT
DNS:EXPLOIT:REQUEST-SHORT-MSG
DNS:EXPLOIT:EMPTY-UDP-MSG
DNS:EXPLOIT:PNTRS-PERNAME-EXCD
DNS:EXPLOIT:POINTER-LOOP
DNS:EXPLOIT:TRANSPOOF-2
DNS:EXPLOIT:BIND-ADDSOA
DNS:EXPLOIT:SQUID-PROXY-DOS
DNS:EXPLOIT:MAL-TXT-REC
DNS:EXPLOIT:ISC-BIND-RDATA-DOS
DNS:EXPLOIT:TRANSPOOF
DNS:EXPLOIT:BIND-MULT-RRSET
DNS:EXPLOIT:MS-WIN-NAT-HLPR-DOS
DNS:EXPLOIT:SQUID-PROXY-PTR-DOS
DNS:EXPLOIT:ISC-BIND-DNS64-RPZ

DNS:FAILURE

DNS:FAILURE:RCODE_NOTAUTH
DNS:FAILURE:RCODE_NOTZONE

DNS:HEADERERROR

DNS:HEADERERROR:INVALID-OPCODE

DNS:INFO

DNS:INFO:RCODE-SERVER-FAILURE
DNS:INFO:TYPE-AXFR
DNS:INFO:OVERSIZED_ADV_PAYLOAD
DNS:INFO:RCODE-BADVERS
DNS:INFO:XFER-BAD
DNS:INFO:XFER-GOOD

DNS:OVERFLOW

DNS:OVERFLOW:INVALID-POINTER
DNS:OVERFLOW:NAME-TOO-LONG
DNS:OVERFLOW:SIG-OVERFLOW
DNS:OVERFLOW:NXT-OVERFLOW
DNS:OVERFLOW:TOO-LONG-TCP-MSG
DNS:OVERFLOW:INVALID-LABEL-LEN
DNS:OVERFLOW:OPT-OVERFLOW
DNS:OVERFLOW:OPT-DOS
DNS:OVERFLOW:SPARC-TCP
DNS:OVERFLOW:BAD-CHAR-UDP
DNS:OVERFLOW:SCO-NAMED2-OF2
DNS:OVERFLOW:SCO-NAMED2-OF1
DNS:OVERFLOW:ADM-TCP
DNS:OVERFLOW:TXTRECORD
DNS:OVERFLOW:NOOP-RQUERY
DNS:OVERFLOW:DNS-ATMA-SIZE-OF
DNS:OVERFLOW:SYMANTEC-CNAME
DNS:OVERFLOW:HOSTNAME-OF
DNS:OVERFLOW:TCP-RESPONSE

DNS:QUERY

DNS:QUERY:NULL-QUERY
DNS:QUERY:VERSION-QUERY
DNS:QUERY:ENC-STATUS-SPOOF
DNS:QUERY:HOSTNAME
DNS:QUERY:AUTHORS
DNS:QUERY:BIND-IQUERY-BO
DNS:QUERY:SYMC-DNS-CACHE
DNS:QUERY:ISC-BIND-NSEC3-DOS
DNS:QUERY:WIN-DNS-SERVER-SPOOF

DNS:REPERR

DNS:REPERR:NULL-RDATA-LEN
DNS:REPERR:NAPRT-IOF

DNS:REQUEST

DNS:REQUEST:REVERSE-LOOKUP
DNS:REQUEST:SUN-JRE-DOS

DNS:TUNNEL

DNS:TUNNEL:NULL-RECORD
DNS:TUNNEL:OZYMANDNS
DNS:TUNNEL:DNS2TCP
DNS:TUNNEL:IODINE
DNS:TUNNEL:SHORT-TTL
DNS:TUNNEL:I2P-DNS-QUERY

DOS

DOS:EMULE-DOS
DOS:SLOWHTTPTEST-TOOL
DOS:RCA-CABLE-MODEM
DOS:UPNP-CHARGEN-DOS
DOS:MULTIVENDOR-TCP-TIMESTAMP

DOS:APPLICATION

DOS:APPLICATION:DOS
DOS:APPLICATION:MS-HIS-UDP
DOS:APPLICATION:MS-HIS-TCP

DOS:IP

DOS:IP:CHARGEN-BOMB
DOS:IP:IGMP-LINUX
DOS:IP:IGMP-OVERSIZE
DOS:IP:FRAGMENT
DOS:IP:PGM

DOS:NETDEV

DOS:NETDEV:LINKSYS-GOZILA-DOS2
DOS:NETDEV:CISCO-SYSLOG-DOS
DOS:NETDEV:HP-LCD-MOD-9001
DOS:NETDEV:CISCO-5000
DOS:NETDEV:NETWORK-3COM-DOS
DOS:NETDEV:HP-LCD-MOD-9100
DOS:NETDEV:LIVINGSTON
DOS:NETDEV:NORTEL-MARLIN
DOS:NETDEV:ASCEND-KILL2
DOS:NETDEV:ROUTEFINDER-VPN-DOS
DOS:NETDEV:CISCO-SWIPE
DOS:NETDEV:CISCO-SUNND
DOS:NETDEV:CISCO-IPMOBILITY
DOS:NETDEV:CISCO-PIM
DOS:NETDEV:WEBJET-WRITETOFILE
DOS:NETDEV:WEBJET-TRAVERSAL
DOS:NETDEV:CISCO-TELNET-BOF1
DOS:NETDEV:WEBJET-FW-INFOLEAK
DOS:NETDEV:WEBJET-HTS-DOT
DOS:NETDEV:LINKSYS-GOZILA-DOS3
DOS:NETDEV:WEBJET-FRAMEWORK
DOS:NETDEV:ASCEND-KILL
DOS:NETDEV:CISCO-HTTPD-DOS
DOS:NETDEV:D-LINK-DNS-320
DOS:NETDEV:CATALYST-SSH-DOS

DOS:WINDOWS

DOS:WINDOWS:WGC-VZMN-JP-CGSI
DOS:WINDOWS:KM1-KW-VTJO-WN
DOS:WINDOWS:MS-RDP-PATTERN-DOS
DOS:WINDOWS:HTTP-SYS
DOS:WINDOWS:WINNUKE-NETBIOS

ECHO

ECHO:CHARGEN-DOS

ECHO:AUDIT

ECHO:AUDIT:LINE

ECHO:EXPLOIT

ECHO:EXPLOIT:MISMATCHING-REPLY
ECHO:EXPLOIT:SERVER-NO-RESPONSE

FINGER:AUDIT

FINGER:AUDIT:REQ-WRONG-FORMAT

FINGER:BACKDOOR

FINGER:BACKDOOR:CMD-ROOTSH

FINGER:DOS

FINGER:DOS:BOMB

FINGER:EXPLOIT

FINGER:EXPLOIT:REDIRECTION
FINGER:EXPLOIT:NULL-BYTE
FINGER:EXPLOIT:DOT-AT-HOST
FINGER:EXPLOIT:ACCOUNT-ENUM
FINGER:EXPLOIT:ZERO-AT-HOST
FINGER:EXPLOIT:PIPE

FINGER:OVERFLOW

FINGER:OVERFLOW:LINE

FINGER:REPLYERROR

FINGER:REPLYERROR:BIN-DATA

FINGER:REQERR

FINGER:REQERR:UNEXP-LINE
FINGER:REQERR:REQ-BINARY-DATA
FINGER:REQERR:BIN-HOST

FINGER:USER

FINGER:USER:SEARCH
FINGER:USER:ROOT
FINGER:USER:SLASH-FILE

FTP

FTP:VSFTPD-BACKDOOR
FTP:CISCO-VPN-ACCESS
FTP:FORMAT-STRING-IN-CMD
FTP:CURL-OF-BANNER
FTP:HTTPDX-DIR-TRAVERSAL
FTP:HOME-FTP-SRVR-MKD
FTP:FREEFLOAT-CMD-BO
FTP:TRIPWIRE-FORMAT-STRING

FTP:AUDIT

FTP:AUDIT:LOGIN-FAILED
FTP:AUDIT:REP-INVALID-REPLY
FTP:AUDIT:COMMAND-FAILED
FTP:AUDIT:REQ-INVALID-CMD-SEQ
FTP:AUDIT:REQ-NESTED-REQUEST
FTP:AUDIT:REQ-UNKNOWN-CMD
FTP:AUDIT:REP-NESTED-REPLY
FTP:AUDIT:REP-BINARY-DATA
FTP:AUDIT:REQ-BINARY-DATA
FTP:AUDIT:BINARY-DATA-FOLDER

FTP:COMMAND

FTP:COMMAND:VICFTPS-DOS
FTP:COMMAND:FTP-FS-COMMAND
FTP:COMMAND:PLATFTP-CD-DOS
FTP:COMMAND:3CDAEMON-PATH-DISCL
FTP:COMMAND:WS-FTP-REST
FTP:COMMAND:SITE-EXEC
FTP:COMMAND:SYMLINK
FTP:COMMAND:STOR-RHOSTS
FTP:COMMAND:SLIMFTP-LIST
FTP:COMMAND:ACFTP-SERV-DOS
FTP:COMMAND:TITAN-SERV-DIR-TRAV
FTP:COMMAND:WS_FTP-CMD-BO
FTP:COMMAND:SITE-CMD-INJ
FTP:COMMAND:SORIN-CHITU-DOS
FTP:COMMAND:CTRL-CHAR
FTP:COMMAND:WINFTP-LIST-CMD-BO
FTP:COMMAND:MALICIOUS-CHARS
FTP:COMMAND:RHINO-DIR-TRAVERSAL
FTP:COMMAND:MULTIPLE-OF

FTP:DIRECTORY

FTP:DIRECTORY:DOT-DOT
FTP:DIRECTORY:DOT-PCT-20-DOT
FTP:DIRECTORY:MSIE-FTP-DIRTRAV
FTP:DIRECTORY:TILDE-ROOT
FTP:DIRECTORY:CISCOFTP-OF

FTP:DOS

FTP:DOS:NULL-CRED
FTP:DOS:ASTERISK
FTP:DOS:GEN-GLOB-DOS
FTP:DOS:VSFTPD-STAT
FTP:DOS:XM-NLST-NEG
FTP:DOS:SOLARFTP-USER-CMD
FTP:DOS:FTPDMIN-LIST-CMD
FTP:DOS:MACOSX-FTPD
FTP:DOS:GOOGLE-CHROME-DOS

FTP:EXPLOIT

FTP:EXPLOIT:ILLEGAL-PORT
FTP:EXPLOIT:SYNTAX-ERROR
FTP:EXPLOIT:BOUNCE-ATTACK
FTP:EXPLOIT:WIN32-WFTPD-BOF
FTP:EXPLOIT:GLFTPD-KAKAKA
FTP:EXPLOIT:FTPBIN-WRITEABLE
FTP:EXPLOIT:ZYXEL-CONF-GET
FTP:EXPLOIT:TYPSOFT-DOS
FTP:EXPLOIT:OPENFTPD-MSG-FS
FTP:EXPLOIT:WSFTP-FMT-STR
FTP:EXPLOIT:CA-FTP-LIST-PASV
FTP:EXPLOIT:MOD-INCLUDE-BOF
FTP:EXPLOIT:VERMILLION-PORT-OF

FTP:EXT

FTP:EXT:DOT-PDF
FTP:EXT:DOT-EXEC

FTP:FILE

FTP:FILE:STOR
FTP:FILE:SPACE.ASP
FTP:FILE:PUT-AUTOEXECBAT
FTP:FILE:RETR
FTP:FILE:WINDOWS-C-ACCESS
FTP:FILE:FREEFLOAT-AUTH-BYPASS

FTP:LUKEMFTP

FTP:LUKEMFTP:URG-RELOGIN

FTP:MS-FTP

FTP:MS-FTP:MSFTPSVC-DOS
FTP:MS-FTP:IIS-BOF
FTP:MS-FTP:MSFTPSVC-EXEC
FTP:MS-FTP:STAT-GLOB
FTP:MS-FTP:IIS7-5-DOS

FTP:OVERFLOW

FTP:OVERFLOW:PATH-TOO-LONG
FTP:OVERFLOW:PASS-TOO-LONG
FTP:OVERFLOW:SITESTRING-2-LONG
FTP:OVERFLOW:LINE-TOO-LONG
FTP:OVERFLOW:USERNAME-2-LONG
FTP:OVERFLOW:MS-IE-FTP-RES-MC
FTP:OVERFLOW:GUILDFTP-HEAP
FTP:OVERFLOW:PATH-LINUX-X86-3
FTP:OVERFLOW:K4FTP-OF1
FTP:OVERFLOW:WUBSD-SE-RACE
FTP:OVERFLOW:WFTPD-MKD-OVERFLOW
FTP:OVERFLOW:OPENBSD-FTPD-GLOB
FTP:OVERFLOW:PCMAN-STOR-BOF
FTP:OVERFLOW:WFTPD-SIZE
FTP:OVERFLOW:S2C-PATH-OF
FTP:OVERFLOW:FREE-FTPD-PASS
FTP:OVERFLOW:EASY-FTP-OF
FTP:OVERFLOW:REST-INT-OF
FTP:OVERFLOW:MUL-FTP-MKDOF
FTP:OVERFLOW:CMD-NOOP-SLED
FTP:OVERFLOW:CMD-OF
FTP:OVERFLOW:ASCII-WRITE
FTP:OVERFLOW:WINFTP-DATA-OF
FTP:OVERFLOW:TYPSOFT-SERVER
FTP:OVERFLOW:UPLUS-MULTI-CMDS
FTP:OVERFLOW:RAIDENFTPD-CMD
FTP:OVERFLOW:SAMI-LIST-CMND-BO
FTP:OVERFLOW:XLINK-CLIENT

FTP:PABLO-FTP

FTP:PABLO-FTP:FORMAT-STRING

FTP:PASSWORD

FTP:PASSWORD:BRUTE-FORCE
FTP:PASSWORD:LRKR0X
FTP:PASSWORD:ROOT
FTP:PASSWORD:SATORI
FTP:PASSWORD:PLUS
FTP:PASSWORD:WH00T
FTP:PASSWORD:H0TB0X
FTP:PASSWORD:FTPPASS-BLUESKIES
FTP:PASSWORD:COMMON-PASSWD
FTP:PASSWORD:USER-DICT
FTP:PASSWORD:DEFAULT-USERNM-PW

FTP:PROFTP

FTP:PROFTP:OVERFLOW1
FTP:PROFTP:SIZE-DOS2
FTP:PROFTP:USER-DOS
FTP:PROFTP:PPC-FS2
FTP:PROFTP:PROFTP-FS-MKDIR
FTP:PROFTP:OFF-BY-ONE
FTP:PROFTP:MOD-SQL-HEAP-OF

FTP:REQERR

FTP:REQERR:REQ-TOO-MANY-ARGS
FTP:REQERR:REQ-MISSING-ARGS
FTP:REQERR:GNULS-WIDTH-DOS

FTP:RPLERR

FTP:RPLERR:CUTEFTP-OF

FTP:SERVU

FTP:SERVU:MDTM-OVERFLOW
FTP:SERVU:STOU-DOS
FTP:SERVU:RNTO-TRAV
FTP:SERVU:LIST-OVERFLOW
FTP:SERVU:CHMOD-OVERFLOW

FTP:USER

FTP:USER:ACFTP-BAD-LOGIN
FTP:USER:ANONYMOUS
FTP:USER:FORMAT-STRING
FTP:USER:IRIX-DEF-ACCT
FTP:USER:ROOT

FTP:VULN

FTP:VULN:WS-FTP-5-0-4
FTP:VULN:SERV-U-FTP-4-2
FTP:VULN:SERV-U-FTP-4-3
FTP:VULN:SERV-U-FTP-5-0-0-6
FTP:VULN:SERV-U-FTP-2-6
FTP:VULN:WS-FTP-4-0-2

FTP:WS-FTP

FTP:WS-FTP:CPWD
FTP:WS-FTP:WS-FTP-COMM-OF
FTP:WS-FTP:SITE-ADMIN-DOS

FTP:WU-FTP

FTP:WU-FTP:LINUX-OF
FTP:WU-FTP:FTPD-BSD-X86
FTP:WU-FTP:SITE-OF
FTP:WU-FTP:SETPROCTITLE
FTP:WU-FTP:IREPLY-FS
FTP:WU-FTP:GLOBARG
FTP:WU-FTP:WUFTPD-FMT-STR
FTP:WU-FTP:OFFBYONE-BOF

GOPHER

GOPHER:IE-GOPHER-OF

GOPHER:INVALID

GOPHER:INVALID:PORT
GOPHER:INVALID:EOL
GOPHER:INVALID:DOC-TYPE
GOPHER:INVALID:NST-REQ
GOPHER:INVALID:TRUNC-LINE

GOPHER:OVERFLOW

GOPHER:OVERFLOW:DISPLAY
GOPHER:OVERFLOW:HOST
GOPHER:OVERFLOW:SELECTOR
GOPHER:OVERFLOW:LINE

HTTP

HTTP:TOO-MANY-PARAMETERS
HTTP:INFO-LEAK-SSN
HTTP:INFO-LEAK-CC
HTTP:JAVA-UPDATE-RCE
HTTP:INTEGARD-PASSWORD-BOF
HTTP:LOCALHOST-ON-INTERNET
HTTP:SUN-WEBDAV-FD
HTTP:REAL-DESCBO
HTTP:MALICIOUS-SESSION-COOKIE
HTTP:MONGOOSE-HTTPD-URI-OF
HTTP:SUN-DIGEST-OF
HTTP:WINAMP-SKIN-DOWNLOAD
HTTP:WEBDAV-SEARCH-NO-LENGTH
HTTP:OPENX-AD-SERVER-PHP-CE
HTTP:EASYLAN-REG-BOF
HTTP:XDOMAINXML
HTTP:WIKI-SERVER-DT
HTTP:WEBDAV-FS
HTTP:YOUNGZSOFT-MAILCOM-BO
HTTP:SAP-MGT-CON-OSEXEC
HTTP:DFIND-PROBE
HTTP:CLAMAV-ENCRYPT-PDF-MC
HTTP:WEBSRV-BO-4096
HTTP:VLCFS
HTTP:ASC-TIMETABLES-SUBJECT-BOF
HTTP:SKYPE-EZPMUTILS
HTTP:STATIC-SERVER-BOF
HTTP:FIREFOX-XDOMAIN-INFODISC
HTTP:SUN-JAVA-SYSTEM-WEBDAV-OF
HTTP:TRENDMICRO-FMT-STR
HTTP:HP-PRINTER-INFO-DISCLOSURE
HTTP:WP-FGALLERY-MAL-FILE-POST
HTTP:TRENDMICRO-SEC-BYPASS
HTTP:MCAFEE-FIREWALL-RCE
HTTP:ADOBE-ROBOHELP-FILE-UPLOAD
HTTP:SYBASE-AGSOAP-EXE-BOF
HTTP:ORACLE-JRE-INSECURE-LOAD
HTTP:NGINX-RQST-URI-SECBYPASS
HTTP:MS-WIN-FOLDER-GUID-CE
HTTP:ESTSOFT-ALZIP-MIM-BO
HTTP:DOURAN-ARB-FILE-DL
HTTP:MS-LYNC-SERVER-RCE
HTTP:WP-FGALLERY-MAL-FILE-HOST
HTTP:SYSAX-SERVER-BOF
HTTP:INTELLITAMPER-DEFER-BO
HTTP:ISAPI-RSA-WEB
HTTP:ALTNWADMIN
HTTP:UBIQUITI-AIROS-CE
HTTP:ZONEALARM-PROXY-DOS
HTTP:INOUT-ARTICLE-BASE-CSRF
HTTP:LANDESK-MGT-GATEWAY-CMDINJ
HTTP:ALLATORI-JAVA-OBFUSCATOR
HTTP:MICROSOFT-WORKS-WKSSS-BO
HTTP:MCAFEE-EPOLICY-XSS
HTTP:LIVE-FOR-SPEED-MPR-BO
HTTP:FUCTWEB-CAPCC-CAPTCHA
HTTP:SONICWALL-CONTENT-FILTER
HTTP:MOREAMP-MAF-BO
HTTP:GTA-SA-MP-CFG-BO
HTTP:WINAMP-WLZ-BO
HTTP:MAPLE-MAPLET-FILE-BO
HTTP:BLUEZONE-ZAD-BO
HTTP:REALTEK-MEDIAPLAYER-PLA-BO
HTTP:WEBMOD-AUTH.W-INFO-DISC
HTTP:LANDESK-REQ-FORGERY
HTTP:GHOSTSCRIPT-ERRPRINTF-BOF
HTTP:NCSS-SPREADSHEET
HTTP:YAHOO-MSNGR-URI-DOS
HTTP:MULTI-MEDIA-FORMATS-BO
HTTP:XNVIEW-MBM-FILE-BO
HTTP:BROWSE3D-SFS-FILE-BO
HTTP:BSPLAYER-BSI-FILE-BO
HTTP:W3C-AMAYA-BOF
HTTP:INTEGARD-VERSION-CHECK
HTTP:NTOP-BASIC-AUTHORIZATION
HTTP:SUN-JAVA-WEBSERVER-DOS
HTTP:XAMPP-REQUEST-FORGERY
HTTP:NOVELL-NETIQ-MOD-POLBYPAS
HTTP:LIGHTHTTPD-CONNECTION-DOS
HTTP:TRENDMICRO-CTRLMGR-SQLINJ
HTTP:ULTRAVNC-VNCLOG-BO
HTTP:NOVELL-NETIQ-EVAL-POLBYPAS
HTTP:FOXIT-FF-URL-STG-BO
HTTP:RUBYONRAILS-JSONYAML-RCE
HTTP:ADOBE-INDESIGN-SOAP-RCE
HTTP:JAVA-UA-EXE-DL
HTTP:NAGIOS-GRAPHEXPLORE-CMDINJ
HTTP:VLC-ABC-FILE-BOF
HTTP:LAYTON-HELPBOX-AUTH-BYPASS
HTTP:RUBY-GEM-SEMICOLON
HTTP:PCAP-FORMATSTR-GENERIC
HTTP:ROBOHELP-SQL-INJ
HTTP:APPLE-QT-TTD-BO
HTTP:VMWARE-VSPHERE-DOS
HTTP:JAVA-JSP-SRC-CODE-DISC
HTTP:FIREFLY-MEDIA-SERVER-DOS
HTTP:KASPERSKY-URI-PARSING-DOS
HTTP:JAVA-EXPRESS-HTML-INJ
HTTP:PARALLEL-PLESK-RCE
HTTP:CLANSPHERE-COOKIE-LFI
HTTP:GD-GRAPHICS-PNG
HTTP:MS-WORDPERFECT-BOF
HTTP:SQUID-HEADER-VALUE-DOS
HTTP:DIGIUM-ASTERISK-BO
HTTP:MS-MDAC-RCE
HTTP:ALTN-SG-OF
HTTP:FIREFOX-IDN-SPOOF
HTTP:RESIN-INFO-DISCLOSURE
HTTP:WORDPRESS-W3PLUGIN-RCE
HTTP:NGINX-CHUNKED-BO
HTTP:JOOMLA-WEBRING-RFI
HTTP:RUBYONRAILS-XMLYAML-RCE
HTTP:SPRING-XMLENTITY-INFODISC
HTTP:CA-XOSOFT-XOSOAP
HTTP:JABBER-SERVER-BYPASS
HTTP:OFFICESCAN-CGIRECVFILE
HTTP:MS-WINDOWS-HYPERLINK-BO
HTTP:APPLE-SGI-BOF
HTTP:MS-DOT-NET-HEAP-CORRUPT
HTTP:GLPI-INSTALLPHP-RCE
HTTP:AVIRA-SECURE-BCKUP-REG-BOF
HTTP:DLINK-DIR605L-CAPTCHA-BOF
HTTP:MS-OUTLOOK-2003-OBJ-SEC-SB
HTTP:EMC-DPA-EJBSERVLET-RCE
HTTP:SONICWALL-GMS-RCE
HTTP:NAGIOS-CONFMGR-SQLINJ
HTTP:JOOMLA-MEDIAMGR-FILEUPLOAD
HTTP:GOOGLE-SKETCHUP-BMP-BO
HTTP:MS-WINDOWS-X509-DOS
HTTP:HTTP-INVALID-PORT-VALUE
HTTP:MCAFEE-WR-JBOSS-RCE
HTTP:MS-TELNET-INSECURE-LOADING
HTTP:MS-DOT-NET-XAML-RCE
HTTP:ISA-AUTH-BYPASS
HTTP:BROWSER-WINDOW-INJECTION
HTTP:IESHIMS-DLL-HIJACK
HTTP:DLL-REQ-VIA-WEBDAV
HTTP:XML-EXTERNAL-ENTITY-INJ
HTTP:SWF-CVE-2014-0503-RCE

HTTP:3COM

HTTP:3COM:LOG-CLEAN
HTTP:3COM:CONF-DOWNLOAD
HTTP:3COM:ADMIN-LOGOUT
HTTP:3COM:3COM-PASS-LEAK
HTTP:3COM:OFFICECONNECT

HTTP:AGORA

HTTP:AGORA:AUTH
HTTP:AGORA:DBACCESS
HTTP:AGORA:POSTGRES65

HTTP:APACHE

HTTP:APACHE:INV-HEADER-DOS
HTTP:APACHE:STRUTS-URI-CMDEXEC
HTTP:APACHE:NOSEJOB
HTTP:APACHE:MODPHP-UPLOAD-HOF
HTTP:APACHE:PHP-DOS
HTTP:APACHE:USER-ENUM
HTTP:APACHE:HTGREP-HDR
HTTP:APACHE:ENCODED-DIRTRAV
HTTP:APACHE:RESIN-WEB-INF
HTTP:APACHE:LONG-HEADER-DOS
HTTP:APACHE:SCALP
HTTP:APACHE:STRUTS-URIREDIRECT
HTTP:APACHE:MOD_PROXY-CHUNKED
HTTP:APACHE:MOD-NTLM-BOF1
HTTP:APACHE:MOD-ISAPI-RCE
HTTP:APACHE:MOD-TCL-FS
HTTP:APACHE:WIN32BATCH
HTTP:APACHE:LDAPFS
HTTP:APACHE:REWRITE-OF
HTTP:APACHE:STRUTS-INCLUDPARAMS
HTTP:APACHE:AXIS-SOAP-DOS
HTTP:APACHE:BYTE-RANGE-LEAK
HTTP:APACHE:MOD-REWRITE-CMD-EXE
HTTP:APACHE:STRUTS2-COOKIE-OGNL
HTTP:APACHE:APR-DOS
HTTP:APACHE:SERVER-STATUS-PROBE
HTTP:APACHE:ARCHIVA-CSRF
HTTP:APACHE:REV-PROXY-EXPLOIT
HTTP:APACHE:STRUTS2-OGNL-INJ
HTTP:APACHE:SERVER-INFO-DISC
HTTP:APACHE:APR-UTIL-LIB-DOS
HTTP:APACHE:STRUTS2-OGNL-CE
HTTP:APACHE:TOMCAT-CAL2JSP-XSS
HTTP:APACHE:MASSACRE-DOS-VAR
HTTP:APACHE:2.0-CGI-PATH-DISC
HTTP:APACHE:RANGE-DOS
HTTP:APACHE:HTTPD-ERROR-400
HTTP:APACHE:MODRPAF-XFWD-DOS
HTTP:APACHE:MOD-CACHE-DOS-CLT
HTTP:APACHE:HTTPD-MODLOG-COOKIE
HTTP:APACHE:MOD-CACHE-DOS-SVR
HTTP:APACHE:MOD-PROXY-SECBYPASS
HTTP:APACHE:STRUTS-RCE
HTTP:APACHE:FILTER-DISPATCHER
HTTP:APACHE:COOKIE-INFO-DISC
HTTP:APACHE:ACTIVEMQ-INFO-DISC
HTTP:APACHE:WEBDAV-PROPFIND
HTTP:APACHE:STRUTS2-PI-RCE
HTTP:APACHE:XSPACE
HTTP:APACHE:APR-PSPRINTF-MC
HTTP:APACHE:SOLR-FILE-DISC
HTTP:APACHE:ROLLER-OGNL-RCE
HTTP:APACHE:STRUTS-OGNL-CMDEXEC
HTTP:APACHE:STRUTS-OGNL-CE
HTTP:APACHE:STRUTS-SKILLNAME-CE
HTTP:APACHE:FILEUPLOAD-CNT-TYPE
HTTP:APACHE:MOD-DAV-MERGE-DOS
HTTP:APACHE:MOD-LOG-CONFIG-DOS
HTTP:APACHE:CAMEL-XSLT-JCE

HTTP:AUDIT

HTTP:AUDIT:UNKNWN-REQ
HTTP:AUDIT:INV-HTTP-VER
HTTP:AUDIT:URL
HTTP:AUDIT:LENGTH-OVER-2048
HTTP:AUDIT:LENGTH-OVER-8192
HTTP:AUDIT:LENGTH-OVER-512
HTTP:AUDIT:TOO-MANY-HEADERS
HTTP:AUDIT:LENGTH-OVER-4096
HTTP:AUDIT:LENGTH-OVER-256
HTTP:AUDIT:LENGTH-OVER-1024
HTTP:AUDIT:REQ-LONG-UTF8CODE
HTTP:AUDIT:FW1-SCHEME-OF
HTTP:AUDIT:REMOTE-URL-IN-VAR
HTTP:AUDIT:NULL-HREF
HTTP:AUDIT:ROBOTS.TXT
HTTP:AUDIT:HTTP-VER-1.0
HTTP:AUDIT:HTTP-1.0-HOST-HEADER
HTTP:AUDIT:UNKNOWN-VERB
HTTP:AUDIT:UNWISE-CHAR
HTTP:AUDIT:GENERIC-FMT-STR
HTTP:AUDIT:BINARY-IN-URLENCODE
HTTP:AUDIT:CHUNKED-TRANSFER

HTTP:BADBLUE

HTTP:BADBLUE:INVALID-GET-DOS
HTTP:BADBLUE:PROXY-RELAY
HTTP:BADBLUE:MFC-ISAPI-CMD-OF

HTTP:BARRACUDA

HTTP:BARRACUDA:PREV-EXEC

HTTP:BIGBROTHER

HTTP:BIGBROTHER:INFO-DISCLOSURE

HTTP:BROWSER

HTTP:BROWSER:POLICY-BYPASS
HTTP:BROWSER:ICQ
HTTP:BROWSER:MARQUEE-TAG-DOS
HTTP:BROWSER:FIREFOX-OGG
HTTP:BROWSER:MOZILLA-DBKEYRANGE
HTTP:BROWSER:GOOGLE-CHROME-DOS
HTTP:BROWSER:SAFARI-RELOAD-DOS
HTTP:BROWSER:FIREFOX-GIF-DOS
HTTP:BROWSER:FIREFOX-DATA-URI
HTTP:BROWSER:CHROME-JS-ENG-MC

HTTP:CGI

HTTP:CGI:AWSTATS
HTTP:CGI:CDOMAINFREE-RMT-EXEC
HTTP:CGI:LISTSERV-BO
HTTP:CGI:EASY-MB-PRINT
HTTP:CGI:RSA-AGENT-BOF
HTTP:CGI:APM-ACC-BYPASS
HTTP:CGI:ANYFORM-SEMICOLON
HTTP:CGI:IKONBOARD-BADCOOKIE
HTTP:CGI:AXIS-EXEC
HTTP:CGI:AXIS-ACCOUNT
HTTP:CGI:LIBCGI-RFP-OVERWRITE
HTTP:CGI:TWIKI-VIEW-EXEC
HTTP:CGI:INCLUDER-EXEC
HTTP:CGI:MONALBUM
HTTP:CGI:CHETCPASSWD-OF
HTTP:CGI:KORWEBLOG-PATHDISC
HTTP:CGI:REF-CMD-INJECT
HTTP:CGI:SOFTCART
HTTP:CGI:SOJOURN-FILE-VIEW
HTTP:CGI:NAGIOS-CMD-INJ
HTTP:CGI:WEBSPIRS-FILE-DISCLSR
HTTP:CGI:STORE-ATTEMPT
HTTP:CGI:INFOSRCH-REMOTE-EXEC
HTTP:CGI:WAYBOARD-FILE-DISCLSR
HTTP:CGI:FAXSURVEY-REMOTE-EXEC
HTTP:CGI:TECHNOTE-MAIN-DCLSR
HTTP:CGI:HASSAN-DIR-TRAVERSAL
HTTP:CGI:QUIKSTORE-CFG-ACCESS
HTTP:CGI:WEBPALS-EXEC
HTTP:CGI:EXTROPIA-DIR-TRAVERSAL
HTTP:CGI:CAREY-COMMERCE-DIR-TRV
HTTP:CGI:CVSWEB-CGI-SEMICOLON
HTTP:CGI:DCFORUM-AZ-EXEC
HTTP:CGI:BUGZILLA-SEMICOLON
HTTP:CGI:EXCITE-AT-ADMIN-CGI
HTTP:CGI:TECHNOTE-PRINT-DSCLSR
HTTP:CGI:ALLAIRE-SHELL-ATTEMPT
HTTP:CGI:HTDIG-INCLUSION
HTTP:CGI:EMUMAIL-INFO-LEAK
HTTP:CGI:SITESEARCHER-EXEC
HTTP:CGI:ORACLE-RPT-INFOLEAK
HTTP:CGI:USERONLINE-LOGLEAK
HTTP:CGI:MONALBUM-INFO
HTTP:CGI:EASYNEWS-ADMIN1
HTTP:CGI:LITESERV-CGI-DISC
HTTP:CGI:LIBCGI-TUXBR-OF1
HTTP:CGI:BOOZT-CGI-OF
HTTP:CGI:CPANEL5-GB-EXEC
HTTP:CGI:SMARTSEARCH-EXEC
HTTP:CGI:TEXIS-INFOPROBE
HTTP:CGI:BATCH-PIPE
HTTP:CGI:MAIL-FORM-ACCESS
HTTP:CGI:SPIDERSALES
HTTP:CGI:TEST-CGI
HTTP:CGI:SUNPS-IRUNBOOK
HTTP:CGI:FORMMAIL-VULN
HTTP:CGI:VIRTUAL-VISION-TRVRSL
HTTP:CGI:ALTAVISTA-TRAVERSAL
HTTP:CGI:GLIMPSE-PIPE
HTTP:CGI:UBNT-AIROS-CMD-INJ
HTTP:CGI:ROADS-FILE-DISCLOSURE
HTTP:CGI:CYBEROFFICE-DB-REQUEST
HTTP:CGI:YABB-DIR-TRAVERSAL
HTTP:CGI:APPLE-QT-FILEDISC1
HTTP:CGI:GROUNDWORK-MONITOR-CE
HTTP:CGI:EMAIL-VIRTUAL-APP
HTTP:CGI:WEBSCADA
HTTP:CGI:MOVABLE-TYPE-UPGRADE
HTTP:CGI:ZEN-LB-CMD-EXEC
HTTP:CGI:TWIKI-SEARCH-CMD-EXEC
HTTP:CGI:AWC-XSL-CMD-INJ
HTTP:CGI:CTEK-SKYROUTER-EXEC
HTTP:CGI:NULL-ENCODING
HTTP:CGI:TWIKI-MAKETEXT-RCE
HTTP:CGI:TWIKI-REV-CMD-INJ
HTTP:CGI:NAGIOS-HISTORY-PRM-BO
HTTP:CGI:NAGIOS-XI-AUTODISC-CMD
HTTP:CGI:CSGUESTBOOK-PLUGIN-CE
HTTP:CGI:ZAMFOO-CMD-INJ
HTTP:CGI:OFFICESCAN-CGI-BO
HTTP:CGI:SUPERMICRO-BOF
HTTP:CGI:NAGIOS-CORE-DOS
HTTP:CGI:GENERIC-WEB-APP-CE

HTTP:CGI:BUGZILLA

HTTP:CGI:BUGZILLA:PRIV-UP

HTTP:CGI:PERL

HTTP:CGI:PERL:WEBHINT-CMD-INJ
HTTP:CGI:PERL:DUMPENV-PROBE

HTTP:CHKP

HTTP:CHKP:AUTH-HDR-BOF
HTTP:CHKP:AUTH-FMT-STR
HTTP:CHKP:VPN1-UTM-XSS

HTTP:CISCO

HTTP:CISCO:CATALYST-ARB-CMD
HTTP:CISCO:SERVLETEXEC
HTTP:CISCO:WIFI-AUTH-DOS
HTTP:CISCO:MARS-JMX
HTTP:CISCO:IOS-HTML-INJ
HTTP:CISCO:UNIFIED-XSS-2
HTTP:CISCO:CISCOWORKS-DIR-TRAV
HTTP:CISCO:UNIFIED-XSS
HTTP:CISCO:CUCM-DIR-TRAV
HTTP:CISCO:IOS-ADMIN-ACCESS
HTTP:CISCO:WIFI-CONTROLLER-DOS
HTTP:CISCO:LINKSYS-CMD-INJ
HTTP:CISCO:IOS-ERROR-DOS
HTTP:CISCO:LINKSYS-CODE-INJ
HTTP:CISCO:LINKSYS-WRT54GL-XSS
HTTP:CISCO:LINKSYS-WRT54GL-CSRF
HTTP:CISCO:SOURCE-CODE-DISC
HTTP:CISCO:PROCESSIMAGESAVE-FU
HTTP:CISCO:LINKSYS-APPLY-RCE
HTTP:CISCO:SCANNER-PROBE
HTTP:CISCO:CONTROLLER-CSRF
HTTP:CISCO:CSUSERCGI-BOF
HTTP:CISCO:DOWNLOADSERVLET-FU
HTTP:CISCO:FILEUPLOADSERVLET

HTTP:CISCO:VOIP

HTTP:CISCO:VOIP:STREAM-ID-REQ
HTTP:CISCO:VOIP:STREAM-ID-DOS
HTTP:CISCO:VOIP:PORT-INFO-DOS

HTTP:COBALT

HTTP:COBALT:CONF-DIR-TRAV
HTTP:COBALT:SEC-REQ-PROBE
HTTP:COBALT:SERVICE-DOS
HTTP:COBALT:SEC-REQ-PROBE-2

HTTP:COLDFUSION

HTTP:COLDFUSION:CFM-FILE
HTTP:COLDFUSION:HEADER-LOG-OF
HTTP:COLDFUSION:CFCACHE-MAP
HTTP:COLDFUSION:GETFILE-PROBE
HTTP:COLDFUSION:CF-CLASS-DWLD
HTTP:COLDFUSION:CVE-2013-3336
HTTP:COLDFUSION:CFIDE-AUTHBYPAS
HTTP:COLDFUSION:ENV-VAR-OW
HTTP:COLDFUSION:XML-CMD-INJ
HTTP:COLDFUSION:ADMIN-PROBE

HTTP:CYCLADES

HTTP:CYCLADES:CONSOLE-CON
HTTP:CYCLADES:SAVEUSER-PRIV

HTTP:DIR

HTTP:DIR:TRAVERSE-DIRECTORY
HTTP:DIR:CRYSTAL-REPORTS
HTTP:DIR:NOVELL-ZENWORKS-TRAV
HTTP:DIR:WP-UNGALLERY-LFD
HTTP:DIR:DIR-TRAV-HDR
HTTP:DIR:DIR-TRAVERSAL
HTTP:DIR:MESMP-DIR-TRAV
HTTP:DIR:WINACE-DIR-TRVRS
HTTP:DIR:ORACLE-HYPERION-TRAV
HTTP:DIR:BARRACUDA-DIRTRAV
HTTP:DIR:QUICKSHARE-DIR-TRAV
HTTP:DIR:DLINK-DNS-DIR-TRAV
HTTP:DIR:APACHE-SHIRO-DIR-TRAV
HTTP:DIR:HP-LOADRUNNER-LOGIN
HTTP:DIR:PARAM-TRAVERSE
HTTP:DIR:HP-LOADRUNNER-EMU
HTTP:DIR:MS-SHAREPOINT

HTTP:DOMINO

HTTP:DOMINO:POST-DOS2
HTTP:DOMINO:ACCEPT-LANG-OF
HTTP:DOMINO:USERNAME-DISCOVERY
HTTP:DOMINO:NSF-DIR-TRAVERSAL
HTTP:DOMINO:NSF-PASSWORD-BYPASS
HTTP:DOMINO:HASH-DUMPER
HTTP:DOMINO:SAMETIME-URL-OF
HTTP:DOMINO:INFO-LEAK
HTTP:DOMINO:CSP-SRC-DISCLOSURE
HTTP:DOMINO:REDIR-BOF
HTTP:DOMINO:HPRAGENTNAME-BOF

HTTP:DOS

HTTP:DOS:HULK-DOS
HTTP:DOS:INF-ARRAY-SORT
HTTP:DOS:SLOW-HEADER-DOS
HTTP:DOS:POPPLER-MAL
HTTP:DOS:HTTPKILLER-KEEPALIVE
HTTP:DOS:GOLDENEYE-DOS
HTTP:DOS:NOOP-SLED-REQ-MALF

HTTP:EXPLOIT

HTTP:EXPLOIT:AMBIG-CONTENT-LEN
HTTP:EXPLOIT:BRUTE-SEARCH
HTTP:EXPLOIT:BRUTE-FORCE
HTTP:EXPLOIT:WEBMIN-FS-INT
HTTP:EXPLOIT:SLASH-EVASION
HTTP:EXPLOIT:SWS-NO-LINEFEED
HTTP:EXPLOIT:VAR-RESPONSE-SPLIT
HTTP:EXPLOIT:ILLEGAL-HOST-CHAR
HTTP:EXPLOIT:DANSIE-INFO-LEAK
HTTP:EXPLOIT:SMALL-FIRST-DATA
HTTP:EXPLOIT:PI3WEB-USERS
HTTP:EXPLOIT:MS-DOS-DEV
HTTP:EXPLOIT:SYM-FILEUPLOAD
HTTP:EXPLOIT:XERVER-NULL-INJ
HTTP:EXPLOIT:SHOUTCAST-FMT-STR
HTTP:EXPLOIT:REDMINE-CMD-EXEC
HTTP:EXPLOIT:BIN-IN-AUTH-BASIC
HTTP:EXPLOIT:FP2K-ASP-UPLOAD
HTTP:EXPLOIT:HEADER-FOLDING
HTTP:EXPLOIT:JUNK-HEADERS
HTTP:EXPLOIT:WEBSTER-URL-OF
HTTP:EXPLOIT:XITAMI-HEAD-DOS
HTTP:EXPLOIT:IE-SAVE-AS-HIDE
HTTP:EXPLOIT:MAL-LNK
HTTP:EXPLOIT:URI-RANDOM-HOST
HTTP:EXPLOIT:SQLXML-ISAPI-OF
HTTP:EXPLOIT:MS-TCPSTACK-URLDOS

HTTP:EXT

HTTP:EXT:DOT-RPT
HTTP:EXT:FILE-EXT-IN-DIR
HTTP:EXT:DOT-XUL
HTTP:EXT:RAT-SVR-PUSH
HTTP:EXT:DOT-PPT
HTTP:EXT:DOT-PIF
HTTP:EXT:DOT-UNSAFE
HTTP:EXT:SCR
HTTP:EXT:DOT-VML
HTTP:EXT:DOT-LNK
HTTP:EXT:HTRSRCFRAG
HTTP:EXT:DOT-HLP
HTTP:EXT:METAFILE
HTTP:EXT:DOT-GRP
HTTP:EXT:DOT-CHM
HTTP:EXT:DOT-RAT
HTTP:EXT:DOT-JOB

HTTP:FRONTPAGE

HTTP:FRONTPAGE:AUTH-PWD-PROBE
HTTP:FRONTPAGE:FRM-RES-PROBE
HTTP:FRONTPAGE:ADMIN.PWD-REQ
HTTP:FRONTPAGE:SERVICE.PWD-REQ
HTTP:FRONTPAGE:FP30REG.DLL-OF
HTTP:FRONTPAGE:SHTML.EXE-PATH
HTTP:FRONTPAGE:DOS-NAME-DOS

HTTP:GMAIL

HTTP:GMAIL:FILE-UPLOAD
HTTP:GMAIL:FILE-DOWNLOAD

HTTP:HOTMAIL

HTTP:HOTMAIL:FILE-DOWNLOAD
HTTP:HOTMAIL:EXE-DOWNLOAD
HTTP:HOTMAIL:LIVE-ATTACH
HTTP:HOTMAIL:LIVE-EXE-ATTACH
HTTP:HOTMAIL:LIVE-ACTIVITY
HTTP:HOTMAIL:FILE-UPLOAD
HTTP:HOTMAIL:ZIP-DOWNLOAD

HTTP:IIS

HTTP:IIS:FILE-LIST-ATTEMPT
HTTP:IIS:MFC-EXT-OF
HTTP:IIS:CMDSHELL-ATTEMPT
HTTP:IIS:ENUMDSN-ATTEMPT
HTTP:IIS:EXAIR-DOS
HTTP:IIS:SHARE-ID
HTTP:IIS:REGREAD-ATTEMPT
HTTP:IIS:SAM-DOWNLOAD-ATTEMPT
HTTP:IIS:BAT-AMP
HTTP:IIS:FPCOUNT-OVERFLOW
HTTP:IIS:ADMIN-PROBE
HTTP:IIS:MALFORMED-HTR-REQUEST
HTTP:IIS:DATA-DISCLOSURE
HTTP:IIS:PERC-2E-ASP
HTTP:IIS:SITE-SERVER-FILE-UPLD
HTTP:IIS:PERL-0A-ATTEMPT
HTTP:IIS:ISM.DLL-FILENAME
HTTP:IIS:JET-DB-VBA-REMOTE-EXEC
HTTP:IIS:FP30REG-CSS1
HTTP:IIS:HDR-EVASION
HTTP:IIS:IISCHECK-PROBE
HTTP:IIS:MALFORMED-EXT-DATA
HTTP:IIS:MSADC-PROBE
HTTP:IIS:MSADC-VBBO-ACCESS
HTTP:IIS:ASPX-DOS
HTTP:IIS:MDAC-RDS-2
HTTP:IIS:INDEX-SERVER-SQLQHIT
HTTP:IIS:LOCALHOST-SPOOF
HTTP:IIS:IIS-AUTH-BYPASS
HTTP:IIS:IIS-HILIGHT-BYPASS
HTTP:IIS:TILDE-INFO-DISC
HTTP:IIS:DIR-BYPASS
HTTP:IIS:IIS-BYPASS
HTTP:IIS:IIS-DISC
HTTP:IIS:IIS-ADS-BYPASS
HTTP:IIS:SENSEPOST.EXE
HTTP:IIS:IIS-6-7-AUTH-BYPASS
HTTP:IIS:SP-SCRIPTRESX-XSS
HTTP:IIS:ASP-SEARCH-PROBE
HTTP:IIS:SHAREPOINT-MUL-XSS
HTTP:IIS:MS-RD-WEB-ACCESS-XSS
HTTP:IIS:ASP-PAGE-BOF
HTTP:IIS:COLDFUSION-INFOLEAK
HTTP:IIS:IIS-HTR-CHUNKED
HTTP:IIS:ASP-RCE
HTTP:IIS:ASP-FORMS-DISCLOSURE
HTTP:IIS:SAMPLE-ACCESS
HTTP:IIS:AD-SERVER-CONFIG
HTTP:IIS:IISAPI-EXT-PATH-DISC
HTTP:IIS:SOURCE-CODE-DISC
HTTP:IIS:SOURCE-VIEW
HTTP:IIS:SHAREPOINT-DOS
HTTP:IIS:ADFS-MAL-HEADER
HTTP:IIS:ASP-NET-FORM-REDIRECT
HTTP:IIS:NSIISLOG-OF
HTTP:IIS:IIS-EXT-BYPASS
HTTP:IIS:SERVERVARIABLES-INFO
HTTP:IIS:DOT-NET-SERVER-DOS
HTTP:IIS:SHAREPOINT-XSS
HTTP:IIS:ASN-1-BOF
HTTP:IIS:ASP-DOT-NET-VSTATE
HTTP:IIS:ASP-CHUNKED-OF
HTTP:IIS:ASP-SHOWCODE
HTTP:IIS:CGI-BIN-CMD-EXE
HTTP:IIS:ASP-DOT-NET-BACKSLASH
HTTP:IIS:ASPNET-DOS
HTTP:IIS:ASPX-URL
HTTP:IIS:ASPNET-DISCLOSURE
HTTP:IIS:MDAC-RDS
HTTP:IIS:HEADER-HOST-DOS
HTTP:IIS:UNC-PATH-DISC
HTTP:IIS:PROPFIND
HTTP:IIS:SHAREPOINT-CONVERT
HTTP:IIS:MS-SHAREPOINT-DOS
HTTP:IIS:NSIISLOG-CHUNKED-POST
HTTP:IIS:HTW-CROSS-SITE
HTTP:IIS:DLL-URL-REQ
HTTP:IIS:IISADMPWD-PROXY-PASSWD
HTTP:IIS:X-SITE-SCRIPT
HTTP:IIS:FASTCGI
HTTP:IIS:INDEX-SERVER-SRC-CODE
HTTP:IIS:MDAC-DATASTUB
HTTP:IIS:ISAPI-IDQ-OVERFLOW
HTTP:IIS:ISAPI-IDA-OVERFLOW
HTTP:IIS:TRACK-REQUEST
HTTP:IIS:HTR-OF-2
HTTP:IIS:SHAREPOINT-PRIV-ESC
HTTP:IIS:ODATA-PROTOCOL-DOS
HTTP:IIS:PBSERVER-PARAM-OF
HTTP:IIS:ISAPI-PRINTER-OVERFLOW
HTTP:IIS:SCHANNEL-IMPROPER-CERT
HTTP:IIS:HTR-OVERFLOW
HTTP:IIS:SHAREPOINT-2010-XSS
HTTP:IIS:COMMAND-EXEC-ALL
HTTP:IIS:ASN.1-BIT-STRING
HTTP:IIS:HTR-ASP-CODE-DISC

HTTP:IIS:CMS

HTTP:IIS:CMS:MAL-CMS-REQ
HTTP:IIS:CMS:MAL-CMS-REQ-2

HTTP:IIS:ENCODING

HTTP:IIS:ENCODING:SINGLE-DIG-2
HTTP:IIS:ENCODING:SINGLE-DIG-1
HTTP:IIS:ENCODING:UNICODE-BP
HTTP:IIS:ENCODING:UNICODE-BP5
HTTP:IIS:ENCODING:UNICODE
HTTP:IIS:ENCODING:PERC-PERC-2
HTTP:IIS:ENCODING:PERC-PERC-1
HTTP:IIS:ENCODING:PERC-PERC-3

HTTP:IIS:WEBDAV

HTTP:IIS:WEBDAV:MALFORMED-REQ2
HTTP:IIS:WEBDAV:MALFORMED-REQ1
HTTP:IIS:WEBDAV:WINDOWS-SHELL
HTTP:IIS:WEBDAV:SEARCH-OF
HTTP:IIS:WEBDAV:REQ-DISCLO
HTTP:IIS:WEBDAV:XML-HANDLER-DOS
HTTP:IIS:WEBDAV:COMMAND-OF
HTTP:IIS:WEBDAV:AUTH-BYPASS

HTTP:INFLATE

HTTP:INFLATE:OVERFLOW
HTTP:INFLATE:TYPE-MISMATCH

HTTP:INFO

HTTP:INFO:REQ-NO-CONTENT-LENGTH
HTTP:INFO:MS-UPDATE
HTTP:INFO:FARK
HTTP:INFO:SPIDER-ROBOT
HTTP:INFO:YOUTUBE
HTTP:INFO:MWS-SEARCH-OF1
HTTP:INFO:RESIN-DEV-WEBROOT
HTTP:INFO:TMICRO-PROXY-REQ
HTTP:INFO:XEROX-DS-INFO
HTTP:INFO:FACEBOOK
HTTP:INFO:OFFLINE-CACHING-HTML5
HTTP:INFO:HTML5-CONTENT
HTTP:INFO:HTTPPOST-GETSTYLE
HTTP:INFO:YOUTUBE-APP
HTTP:INFO:IDN-HOSTNAME
HTTP:INFO:NULL-AUTH
HTTP:INFO:MOBILE-UA
HTTP:INFO:CHARSET-ASCII
HTTP:INFO:AUTH-NEGOTIATE

HTTP:INFO-LEAK

HTTP:INFO-LEAK:ASP-WEB-CONFIG
HTTP:INFO-LEAK:PHP-PROXIMA
HTTP:INFO-LEAK:JOOMLA-SQLREPORT
HTTP:INFO-LEAK:POLYCOM
HTTP:INFO-LEAK:NSCONFIG
HTTP:INFO-LEAK:HTACCESS
HTTP:INFO-LEAK:SALESCART-DB
HTTP:INFO-LEAK:NETGEAR-CONFLEAK
HTTP:INFO-LEAK:JBOSS-JSP-SRC
HTTP:INFO-LEAK:VIGNETTE-LEAK
HTTP:INFO-LEAK:VIGNETTE-LEAK-2
HTTP:INFO-LEAK:HTPASSWD-REQUEST
HTTP:INFO-LEAK:VIGNETTE-DIAG
HTTP:INFO-LEAK:GOAHEAD-PERM
HTTP:INFO-LEAK:WIN-INI
HTTP:INFO-LEAK:WFCHAT
HTTP:INFO-LEAK:CUTENEWS
HTTP:INFO-LEAK:DS-STORE
HTTP:INFO-LEAK:ORACLE-SQL
HTTP:INFO-LEAK:LAYTON-TECH
HTTP:INFO-LEAK:F-SECURE-MANAGER
HTTP:INFO-LEAK:ZYXEL-PRESTIGE
HTTP:INFO-LEAK:SELENA-WEBSTORE
HTTP:INFO-LEAK:BANNERMATIC
HTTP:INFO-LEAK:COFFEECUP
HTTP:INFO-LEAK:BARRACUDADRIVE
HTTP:INFO-LEAK:SNOOP-DISLOSURE
HTTP:INFO-LEAK:BOOT-INI
HTTP:INFO-LEAK:BUGZILLA-DISC
HTTP:INFO-LEAK:WORDPRES-GAZETTE
HTTP:INFO-LEAK:WEB-INF-DOT
HTTP:INFO-LEAK:CART32-INFO-LEAK
HTTP:INFO-LEAK:LIVE-WIRE
HTTP:INFO-LEAK:CA-TOTAL-DEFENSE
HTTP:INFO-LEAK:WP-DBM-CFG
HTTP:INFO-LEAK:SSN-CLEARTEXT
HTTP:INFO-LEAK:CC-CLEAR-VAR
HTTP:INFO-LEAK:SHAREPOINT-INFO
HTTP:INFO-LEAK:HP-SITESCOPE
HTTP:INFO-LEAK:F5-BIG-IP-XML
HTTP:INFO-LEAK:HP-APISITESCOPE
HTTP:INFO-LEAK:MS-IE-MOUSE-MVMT
HTTP:INFO-LEAK:SUGARCRM
HTTP:INFO-LEAK:JUNOS-J-WEB
HTTP:INFO-LEAK:MUL-WEB-SERVER
HTTP:INFO-LEAK:DVR-VS-LOG-DISC
HTTP:INFO-LEAK:DVR-VS-PWD-DISC
HTTP:INFO-LEAK:MS-VISIO-XML
HTTP:INFO-LEAK:HYPERSTOP-HOST
HTTP:INFO-LEAK:BOOT-INI-TCP
HTTP:INFO-LEAK:MS-PKCS-INFODISC
HTTP:INFO-LEAK:SPRING-FRAMWORK
HTTP:INFO-LEAK:REDHAT-JBOSS-XXE
HTTP:INFO-LEAK:REDHAT-JBOSS
HTTP:INFO-LEAK:IBM-FP-SERLET
HTTP:INFO-LEAK:NET-INFO-DISC
HTTP:INFO-LEAK:ASP-ORACLE-PAD
HTTP:INFO-LEAK:DOT-NET-CODE
HTTP:INFO-LEAK:HTTP-SHARE-ENUM
HTTP:INFO-LEAK:TOSTATICHTML-API

HTTP:INVALID

HTTP:INVALID:INVLD-AUTH-CHAR
HTTP:INVALID:HDR-FIELD
HTTP:INVALID:BAD-CONTENT-LENGTH
HTTP:INVALID:STATUS-CODE
HTTP:INVALID:NON-STAND-W-SPACE
HTTP:INVALID:UNEXPECTCHAR
HTTP:INVALID:INVLD-AUTH-LEN
HTTP:INVALID:MISSING-REQ
HTTP:INVALID:MSNG-HTTP-VER
HTTP:INVALID:DUPLICATE-HEADER
HTTP:INVALID:EXPECT
HTTP:INVALID:VAR-NEG-LG

HTTP:IRIX

HTTP:IRIX:CGI-BIN-WRAP
HTTP:IRIX:CGI-BIN-REMOTE-EXEC

HTTP:LHTTPD

HTTP:LHTTPD:HOST-DOT-DOT-SLASH
HTTP:LHTTPD:FCGI-HEADER-OF
HTTP:LHTTPD:GET-BOF

HTTP:LINUX

HTTP:LINUX:RPM-QUERY
HTTP:LINUX:REDHAT-ACCEPT-LANG
HTTP:LINUX:DD-WRT-MGMT-GUI

HTTP:MISC

HTTP:MISC:EMC-CMCNE-FU
HTTP:MISC:REAL-RMP-TRAV
HTTP:MISC:OPENPLI-CE
HTTP:MISC:MOBY-LENGTH-DOS
HTTP:MISC:BLUECOAT-LICENSE
HTTP:MISC:BLUECOAT-ADMIN
HTTP:MISC:MCAFFEE-SRV-HDR
HTTP:MISC:WWWACL-PROBE
HTTP:MISC:AVAILABLEMEDIA-REQ
HTTP:MISC:DLINK-CAMERA-VIDEO-BY
HTTP:MISC:JIGSAW-DEV-DOS1
HTTP:MISC:SHAMBALA-DOS1
HTTP:MISC:HP-PROCURVE-RESET
HTTP:MISC:VISNETIC-DOS
HTTP:MISC:WEBWEAVER-DDP
HTTP:MISC:XENEO-WEBREQ-DOS
HTTP:MISC:TOPTOOLS-HPNST-DOS
HTTP:MISC:RAS-CFG
HTTP:MISC:XOOPS-WEBROOT
HTTP:MISC:MOODLOGIC-CLIENT
HTTP:MISC:NOOP-SLIDE-HEAD-OF
HTTP:MISC:EMULIVE-ADMIN
HTTP:MISC:NG-WG602-BACKDOOR
HTTP:MISC:NEOTERIS-IVE-BF
HTTP:MISC:X-MICRO-WLAN-PASSWORD
HTTP:MISC:LINBIT-LINBOX-BYPASS
HTTP:MISC:DYNDNSUPDATE
HTTP:MISC:EZGUESTBOOK
HTTP:MISC:FORTIGATE-CSRF
HTTP:MISC:MUTINY-5-EDITDOCUMENT
HTTP:MISC:MOTOROLA-WR850
HTTP:MISC:RAILS-ROUTING
HTTP:MISC:APPLE-MAPS-APP
HTTP:MISC:KEYFOCUS-KF-DIRTRAV
HTTP:MISC:WESTERN-DIGITAL-LFI
HTTP:MISC:MANAGEENGINE-FILE-UP
HTTP:MISC:ZOPE-CMD-RCE
HTTP:MISC:ZENOSS-CE
HTTP:MISC:COREL-PDF-FUSION-XPS
HTTP:MISC:DLINK-CE
HTTP:MISC:NOOP-SLIDE-REQ-OF
HTTP:MISC:TM-INTERSCAN-DIR-TRAV
HTTP:MISC:ABYSS-HDR-DOS
HTTP:MISC:DLINK-CMD-INJECTION
HTTP:MISC:JENKINS-CONSOLE-CE
HTTP:MISC:OPENFILER-NETWORKCARD
HTTP:MISC:NGINX-CHUNK-TRANS-DOS
HTTP:MISC:SPAM-TO-PHP-REDIR
HTTP:MISC:NEWGEN-OMNIDOCS-PRIV
HTTP:MISC:SPRING-HEADER-INJ
HTTP:MISC:LIFESIZE-ROOM-SEC-BY
HTTP:MISC:XEROX-4595-COPIER
HTTP:MISC:LIFESIZE-ROOM-CMD-INJ
HTTP:MISC:BLUECOAT-HOST-HDR-OF
HTTP:MISC:GRAPHITE-RCE
HTTP:MISC:PYTHON-ZLIB-BO
HTTP:MISC:MAYA-EO-VIDEO-BO
HTTP:MISC:MEGACUBO-URI-HANDLR
HTTP:MISC:DESTINY-PLAYER-DOS
HTTP:MISC:MINIUPNPD-SOAP-ACTION
HTTP:MISC:BLUECOAT-K9-BO
HTTP:MISC:FOXIT-READER-BO
HTTP:MISC:ABEE-CHM-MAKER-RCE
HTTP:MISC:DB-POMER-AMP-BO
HTTP:MISC:COMPFACE-XBM-BO
HTTP:MISC:EVIEWS-PRG-BO
HTTP:MISC:SAVANT-WEBSERVER-BOF
HTTP:MISC:DDWRT-REQUEST-FORGERY
HTTP:MISC:DLINK-DIR-300
HTTP:MISC:PLATINUM-UPNP-LIB-BO
HTTP:MISC:MULTI-ANTIVIRUS-ASCII
HTTP:MISC:ICARUS-ICP-BO
HTTP:MISC:PYTHON-IMGOP-OF
HTTP:MISC:PYTHON-PYLOCALE
HTTP:MISC:IDM-LANG-BO
HTTP:MISC:HYDRA-IRC-DOS
HTTP:MISC:APPLE-INSTALLER-FS
HTTP:MISC:BUFFALO-LINK-INFO
HTTP:MISC:UBIQUITI-AIROS-CE
HTTP:MISC:ASTIUM-PBX-PHP-CE
HTTP:MISC:SONICWALL-AUTH-BYPAS
HTTP:MISC:MONOWALL-CSRF
HTTP:MISC:AWSTATS-EXEC
HTTP:MISC:NGINX-ENCODED-DOS
HTTP:MISC:SQUID-DNS-REPLIES
HTTP:MISC:WEEVELY
HTTP:MISC:DLINK-CAPTCHA-BO
HTTP:MISC:MS-FOREFRONT-DOS
HTTP:MISC:BELKIN-ROUTER-UPLOAD
HTTP:MISC:DLINK-INFO-DISCLOSURE
HTTP:MISC:HASTYMAIL-CMD-INJ
HTTP:MISC:SAP-ITS-INFO-DISC
HTTP:MISC:CVSTRAC-FILEDIFF-RCE
HTTP:MISC:TP-LINK-TD-8817-CSRF
HTTP:MISC:AV-INVALID-CHKSUM
HTTP:MISC:AIRSPAN-PROST-WIMAX
HTTP:MISC:RUBY-WEBRICK-ESCAPE
HTTP:MISC:WIRESHARK-DECT-OF
HTTP:MISC:DATALIFE-ENGINE-RCE
HTTP:MISC:CAMTRON-AUTH-BYPASS
HTTP:MISC:ALCATEL-OMNIPCX-RCE
HTTP:MISC:ALCATEL-OMNIPCX-CE
HTTP:MISC:WEB-BBS-CE
HTTP:MISC:COPPERMINE-SQL-INJ
HTTP:MISC:WEBFILEMANAGER-RFI
HTTP:MISC:DLINK-OS-CMD-INJ
HTTP:MISC:DVR-VS-RCE
HTTP:MISC:WIRESHARK-MMS-DOS
HTTP:MISC:D-LINK-DAP-1160
HTTP:MISC:D-LINK-DIR-615-PASSWD
HTTP:MISC:MUTINY-CMD-INJ
HTTP:MISC:MS-XML-SIG-VAL-DOS
HTTP:MISC:GOOGLE-SKETCHUP
HTTP:MISC:BEETEL-TC1-450-CSRF
HTTP:MISC:NEG-CTN-LENGTH-SVR
HTTP:MISC:DAS-STUDIO-RCE
HTTP:MISC:ADOBE-COLDFUSION-HTML
HTTP:MISC:MANAGEENGINE-APPS
HTTP:MISC:F-PORT-ANTIVIRUS-OF
HTTP:MISC:MS-SHARE-POINT-RCE
HTTP:MISC:HP-SYS-IPRANGE-OF
HTTP:MISC:NETGEAR-CMD-INJ
HTTP:MISC:POSTER-SW-PUI-FILE-OF
HTTP:MISC:DLINK-CAMERA-CMD-INJ
HTTP:MISC:EDWARDS-JS-PACKER
HTTP:MISC:ESF-PFSENSE-RCE
HTTP:MISC:NEG-CTN-LENGTH-CLT
HTTP:MISC:MS-MOVIE-MAKER-OCX

HTTP:NCSA

HTTP:NCSA:NPH-TEST-CGI
HTTP:NCSA:PHF-EXEC

HTTP:NETGEAR

HTTP:NETGEAR:DG834G-DEBUG-MODE
HTTP:NETGEAR:NETGEAR-PRO-SAFE
HTTP:NETGEAR:DGN1000B-SETUP-RCE

HTTP:NETSCAPE

HTTP:NETSCAPE:ENTERPRISE-DOS
HTTP:NETSCAPE:INDEX-DISCLOSURE

HTTP:NOVELL

HTTP:NOVELL:WEBACC-MODIFY
HTTP:NOVELL:GROUPWISE-NETAGT-BO
HTTP:NOVELL:IMANAGER-TOMCAT-BOF
HTTP:NOVELL:DHOST-BOF
HTTP:NOVELL:EDIR-DHOST
HTTP:NOVELL:TEAMING-UPLOAD
HTTP:NOVELL:GROUPWISE-IMG-BOF
HTTP:NOVELL:ZENWORKS-RTRLET-COM
HTTP:NOVELL:REPORTER-AGENT
HTTP:NOVELL:ZENWORKS-INFODISC
HTTP:NOVELL:DHOST-URI-BOF
HTTP:NOVELL:NETMAIL-WEBADMIN
HTTP:NOVELL:EDIRECTORY-SOAP
HTTP:NOVELL:EDIR-ACCEPT-LANG-OF

HTTP:ORACLE

HTTP:ORACLE:CHAR-CONV-VULN
HTTP:ORACLE:SOAP-CONF
HTTP:ORACLE:CONF-ACCESS
HTTP:ORACLE:APEX-HASH
HTTP:ORACLE:SERVER-FORMS-CE
HTTP:ORACLE:ORACLE-SBA
HTTP:ORACLE:GLASSFISH-REST
HTTP:ORACLE:GLASSFISH-BYPASS
HTTP:ORACLE:BACKUP-AUTH-BYPASS
HTTP:ORACLE:XML-SIG-SPOOFING
HTTP:ORACLE:PARADOX-DB-DOS
HTTP:ORACLE:OUTSIDE-IN-PRDOX-BO
HTTP:ORACLE:GLASSFISH-MUL-XSS
HTTP:ORACLE:WEBCENTER-HEADR-INJ
HTTP:ORACLE:ENDECA-SERVER-RCE
HTTP:ORACLE:OUTSIDEIN-MET-BOF
HTTP:ORACLE:OUTSIDE-IN-MSACCESS
HTTP:ORACLE:APP-SERVER-BYPASS
HTTP:ORACLE:9I-APP-SERVER-DOS
HTTP:ORACLE:COREL-DRAW-BO
HTTP:ORACLE:BACKUP-CMD-INJ
HTTP:ORACLE:OUTSIDEIN-CORELDRAW
HTTP:ORACLE:REPORTS-RCE
HTTP:ORACLE:JAVA-BEAN-FILE-DISC
HTTP:ORACLE:LOGIN-COOKIES-INJ
HTTP:ORACLE:OS-2-METAFILE-BOF
HTTP:ORACLE:SRV-OPMN-FS

HTTP:OVERFLOW

HTTP:OVERFLOW:CONTENT-OVERFLOW
HTTP:OVERFLOW:HEADER
HTTP:OVERFLOW:HOST
HTTP:OVERFLOW:AUTHORIZATION
HTTP:OVERFLOW:SERVER
HTTP:OVERFLOW:CONTENT-MD5
HTTP:OVERFLOW:REFERER
HTTP:OVERFLOW:CONTENT-LANGUAGE
HTTP:OVERFLOW:ACCEPT-ENCODING
HTTP:OVERFLOW:ACCEPT
HTTP:OVERFLOW:CONTENT-LOCATION
HTTP:OVERFLOW:CONNECTION
HTTP:OVERFLOW:ACCEPT-LANGUAGE
HTTP:OVERFLOW:CONTENT-LENGTH
HTTP:OVERFLOW:CONTENT-ENCODING
HTTP:OVERFLOW:USER-AGENT
HTTP:OVERFLOW:SET-COOKIE
HTTP:OVERFLOW:TRANSFER-ENCODING
HTTP:OVERFLOW:AUTH-OVFLW
HTTP:OVERFLOW:VERB-OVERFLOW
HTTP:OVERFLOW:INV-CHUNK-LEN
HTTP:OVERFLOW:CHUNKS-TOO-SMALL
HTTP:OVERFLOW:CONTENT-TYPE
HTTP:OVERFLOW:CHUNK-LEN-OFLOW
HTTP:OVERFLOW:COOKIE
HTTP:OVERFLOW:URL-OVERFLOW
HTTP:OVERFLOW:CHUNK-OVERFLOW
HTTP:OVERFLOW:CONTENT-RANGE
HTTP:OVERFLOW:SAMBAR-SEARCH
HTTP:OVERFLOW:XITAMIIFMOD
HTTP:OVERFLOW:NULLHTTPD-ROOT-OF
HTTP:OVERFLOW:MULTIWEB-REQOF
HTTP:OVERFLOW:HP-POWERMAN-OF
HTTP:OVERFLOW:HTTPDX-GET-URL-OF
HTTP:OVERFLOW:HTTPDX-POST-BOF
HTTP:OVERFLOW:WSHELL-CGIC
HTTP:OVERFLOW:GAZTEK-HTTPD-OF
HTTP:OVERFLOW:WEBC-REQ-OF
HTTP:OVERFLOW:ATP-HTTPD-OF
HTTP:OVERFLOW:SERVU-SESSION
HTTP:OVERFLOW:SIMPLE-WEB-SRV-BO
HTTP:OVERFLOW:EVOCAM-WEBSRV-GET
HTTP:OVERFLOW:ACROBATX-NULL
HTTP:OVERFLOW:WEBDAV-JAVASYSTEM
HTTP:OVERFLOW:MAIL-ENABLE-AUTH
HTTP:OVERFLOW:OVWEBHELP-BO
HTTP:OVERFLOW:HTTPDX-URL
HTTP:OVERFLOW:AUTH-OVERFLOW
HTTP:OVERFLOW:MALICIOUS-HOST
HTTP:OVERFLOW:SAVANT
HTTP:OVERFLOW:JANA-PRXY-OF1
HTTP:OVERFLOW:IMAGEMAGICK-EXIF
HTTP:OVERFLOW:MISSING-VER-BO
HTTP:OVERFLOW:RSA-WEB-OF
HTTP:OVERFLOW:COREL-WP-BOF
HTTP:OVERFLOW:IMAGEMAGICK-SGI
HTTP:OVERFLOW:ACROBATX-HEAP
HTTP:OVERFLOW:PI3WEB-SLASH-OF
HTTP:OVERFLOW:COREHTTP-URI
HTTP:OVERFLOW:SYBASE-WEBCONSOLE
HTTP:OVERFLOW:LINKSYS-APPLY
HTTP:OVERFLOW:OPENVIEW-NNM-BO
HTTP:OVERFLOW:MS-HTTP-SERVICES
HTTP:OVERFLOW:MS-W3WHO-OF
HTTP:OVERFLOW:MS-IE-URL-BOF
HTTP:OVERFLOW:METHOD-GENRC-OF
HTTP:OVERFLOW:LIBYAML-SCANNER

HTTP:OWA

HTTP:OWA:LOGIN-REDIR
HTTP:OWA:EXCHANGE-SERVER

HTTP:PASSWD

HTTP:PASSWD:COMMON

HTTP:PHP

HTTP:PHP:FORMMAIL-INCLUDE
HTTP:PHP:SQUIRRELMAIL
HTTP:PHP:COOLFORUM-INJ
HTTP:PHP:BZOPEN-OF
HTTP:PHP:GLOBALS-INJ
HTTP:PHP:PHP-CAL-FILE-INC
HTTP:PHP:ALEXPHP-INCLUDE
HTTP:PHP:SILENT-STORM-ADMIN
HTTP:PHP:BLACKBOARD-INC
HTTP:PHP:COOLPHP-DIRTRAV
HTTP:PHP:VBULLETIN-CODE-EXEC
HTTP:PHP:REMOTE-FILE-INCL
HTTP:PHP:OPEN-REALITY-XSS-SQLI
HTTP:PHP:EXOOPS-FD
HTTP:PHP:TIKIWIKI-CMD-EXEC
HTTP:PHP:CACTI-RRD-AUTH-BYPASS
HTTP:PHP:SQUIRRELMAIL-AUTH
HTTP:PHP:FORMMAIL-SCRIPTROOT
HTTP:PHP:FAMILY-CONN-CMS-RCE
HTTP:PHP:PHPRPC-EXEC
HTTP:PHP:TIKIWIKI-FORM
HTTP:PHP:WP-GLOBAL-INFO-DISC
HTTP:PHP:PINEAPP-LIVELOG-RCE
HTTP:PHP:RUNCMS-FILE-UP
HTTP:PHP:PHPZIPURL
HTTP:PHP:PHP-FILE-INCL
HTTP:PHP:PHPINFO-SERVER
HTTP:PHP:PHPINFO-QUERY
HTTP:PHP:REDHAT-PIRANHA-PASSWD
HTTP:PHP:LOKWABB-PRIVM2
HTTP:PHP:MIDICART-DB
HTTP:PHP:MANTIS-ARB-EXEC1
HTTP:PHP:LOKWABB-PRIVM
HTTP:PHP:LOKWABB-PRIVM3
HTTP:PHP:FORMAT-OF
HTTP:PHP:PHPPASS-BYPASS
HTTP:PHP:YABBSE-PKG-EXEC
HTTP:PHP:COOLFORUM-SRC-DISC
HTTP:PHP:WOLTAB-SQL-INJ
HTTP:PHP:LOG-INSERT
HTTP:PHP:PHPFORUM-INC
HTTP:PHP:DFORUM-PHP-INC
HTTP:PHP:DOTBR-PHP-EXEC
HTTP:PHP:CEDRIC-EMAIL-PHPINC2
HTTP:PHP:PAGETOOL-SQL-INJ
HTTP:PHP:YABBSE-SSI-INCLUDE
HTTP:PHP:WORDPRESS-UPLOAD
HTTP:PHP:PMACHINE-INCLUDE
HTTP:PHP:PMACHINE-PATH-DISC
HTTP:PHP:JOOMLA-DIR-TRAV
HTTP:PHP:WORDPRESS-SPEED-RCE
HTTP:PHP:ACONTENT-AUTH-BYPASS
HTTP:PHP:MLOG-SCREEN
HTTP:PHP:DOTBR-INFO-LEAK
HTTP:PHP:ULTIMATE-PHP-BOARD
HTTP:PHP:WORDPRESS-USER-INJ
HTTP:PHP:GLOSSWORD-FILE-UPLOAD
HTTP:PHP:GAPICMS-DIRDEPTH-INC
HTTP:PHP:SCHEDULEIT-RCE
HTTP:PHP:QDPM-FILE-UPLOAD
HTTP:PHP:TAX-DRAWIMAGE-RCE
HTTP:PHP:CLAROLINE-INCLUDE
HTTP:PHP:CEDRIC-EMAIL-PHPINC1
HTTP:PHP:SITEMAN-USER
HTTP:PHP:WEBMIN-TARGET
HTTP:PHP:PHPMYNEWS-FILE-ACCESS
HTTP:PHP:POSTNUKE-CMD-EXEC
HTTP:PHP:SYM-WG-FILE-UP
HTTP:PHP:AWSTATS-SORT
HTTP:PHP:CACTI-RDD-LOCAL-SCRIPT
HTTP:PHP:WEBCAL-INC
HTTP:PHP:WP-FOXYPRESS-FILE-UP
HTTP:PHP:VWAROOT-INCLUDE
HTTP:PHP:CACTI-CONFIG-INC
HTTP:PHP:VAMCART-FU
HTTP:PHP:PODCAST-FILE-INCL
HTTP:PHP:WP-MRKPLC-UPLOADIFY
HTTP:PHP:WP-DOUPLOAD-FU
HTTP:PHP:MEDIAWIKI-RCE
HTTP:PHP:PHPROJEKT-INC
HTTP:PHP:XODA-FILE-UPLOAD
HTTP:PHP:FILE-INCL-DL
HTTP:PHP:OPEN-FLASH-CHART-RCE
HTTP:PHP:PHPLIB-REMOTE-EXEC
HTTP:PHP:WORDPRESS-SPELCHECK-FI
HTTP:PHP:SYM-WG-IPCHANG
HTTP:PHP:PHPWEB-REMOTE-FILE
HTTP:PHP:PINEAPP-CMD-INJ
HTTP:PHP:CMSQLITE-LFI
HTTP:PHP:STUNSHELL-RCE
HTTP:PHP:SYM-WG-FILE-DOWN-DEL
HTTP:PHP:BASILIC-CMD-EXE
HTTP:PHP:SUGARCRM-CE
HTTP:PHP:AJAXPLORER-RCE
HTTP:PHP:WAN-EMULATOR-CE
HTTP:PHP:PINE-APP-CMD-INJE
HTTP:PHP:PHPMYNEWS-INCLUDE
HTTP:PHP:WORDPRESS-COOKIE-INJ
HTTP:PHP:JOOMLA-LOC-FILE
HTTP:PHP:NARCISSUS-CMD-EXE
HTTP:PHP:XML-HEAP-MEM-CORR
HTTP:PHP:COMPACTCMS-ENGINE-RFI
HTTP:PHP:PACER-CMS-FILE-DELETE
HTTP:PHP:WEBSVN-CMD-INJ
HTTP:PHP:PACER-EDITION-CMS-LFI
HTTP:PHP:SSL-CERT-SEC-BYPASS
HTTP:PHP:JOOMLA-XCLONER
HTTP:PHP:WORDPRESS-MUL-FL-GAL
HTTP:PHP:WORDPRESS-MUL-GND-ALBM
HTTP:PHP:724CMS-LFI
HTTP:PHP:JOOMLA-FILE-LISTER
HTTP:PHP:TINYWEBGALLERY-LFI
HTTP:PHP:MEDIAWIKI-SCRIPT-INSER
HTTP:PHP:WORDPRESS-OPS-LFI
HTTP:PHP:WEBTESTER-CMD-EXE
HTTP:PHP:N-CMS-PAGE-LFI
HTTP:PHP:BACULA-WEB-REPORT
HTTP:PHP:WP-IS-HUMAN-CMD-INJ
HTTP:PHP:EXTPLORER-FILE-UPLOAD
HTTP:PHP:CONSTRUCTR-CMS-MUL
HTTP:PHP:MYBB-BACKDOOR
HTTP:PHP:GIF-HEADER-EVASION
HTTP:PHP:WP-GIULIO-GANCI-DM-FU
HTTP:PHP:EARK-PHP-RFI
HTTP:PHP:EASYPHP-CODETESTER-RCE
HTTP:PHP:VBULLETIN-IMPEX-INC
HTTP:PHP:ARDEACORE-RFI
HTTP:PHP:CENTERON-DIR-TRAV
HTTP:PHP:WHMCS-LFI
HTTP:PHP:CACTI-RRD-FILE-INC
HTTP:PHP:OSCOMMERCE-ADMIN
HTTP:PHP:BASE-RFI
HTTP:PHP:SYM-GW-LFI
HTTP:PHP:CMD-INJ-UA
HTTP:PHP:PROJECTPIER-FILE-UP
HTTP:PHP:EXIF-HEADER
HTTP:PHP:WORDPRESS-JQUERY-LFI
HTTP:PHP:WP-GLOBAL-CONT-CE
HTTP:PHP:PINEAPP-COMMAND-INJ
HTTP:PHP:HTML-SPCL-CHARS
HTTP:PHP:AWACTSCRPT-CMS-FILE-UP
HTTP:PHP:HORDE-EVAL
HTTP:PHP:WP-GRAND-FLASH
HTTP:PHP:MANTIS-ARB-EXEC2
HTTP:PHP:WP-GRAND-FLASH-ALBUM
HTTP:PHP:SPHPBLOG-PW-DOWNLOAD
HTTP:PHP:PHPESCSHELL
HTTP:PHP:PHP-XML-CMD
HTTP:PHP:TIKIWIKI-JHOT
HTTP:PHP:PINE-APP-CMD-INJ
HTTP:PHP:MOODLE-TEX-FILTER-RCE
HTTP:PHP:BITRIX-SITE-MGR-CS
HTTP:PHP:JOOMLA-COM-COLLECTOR
HTTP:PHP:DRIES-BUYTRT-DRUPAL-ID
HTTP:PHP:JOOMLA-JCE-FILE-UPLOAD
HTTP:PHP:CHARTS-RCE
HTTP:PHP:REGISTER-VARIABLE-CE
HTTP:PHP:CAUPOSHOP-LFI
HTTP:PHP:ZEBRAFEEDS-RFI
HTTP:PHP:SITE-ASSISTANT-RFI
HTTP:PHP:OABOARD-RFI
HTTP:PHP:BITWEAVER-LFI
HTTP:PHP:OSSIM-MUL-CMD-EXE
HTTP:PHP:PHP-NEWS-FILE-INC
HTTP:PHP:KIETU-HIT-INCLUDE
HTTP:PHP:JOOMLA-JOOMTOUCH-LFI
HTTP:PHP:INTERPHOTO-IPLANG-LFI
HTTP:PHP:MEMORY-LIMIT-CE
HTTP:PHP:FREENEWS-PHP-INC1
HTTP:PHP:WOW-ROSTER-RFI
HTTP:PHP:OPEN-EDUCATION-SYS-RFI
HTTP:PHP:ULTIMATE-PHP-CODE-EXEC
HTTP:PHP:SABDRIMER-RFI
HTTP:PHP:WP-BRUTE-FORCE-LOGIN
HTTP:PHP:MULTIPROD-CONFIG-RFI
HTTP:PHP:WP-ADMIN-CONFIG-BYPASS
HTTP:PHP:JOOMLA-PHP-OBJ-INJ
HTTP:PHP:WEBID-FILE-DISCLOSURE
HTTP:PHP:CMD-INJ
HTTP:PHP:WP-LOGIN-PASS-RESET
HTTP:PHP:SDNTOJEWISH-FUNC-OF
HTTP:PHP:UPLOAD-LOCATION
HTTP:PHP:NETWORK-WEATHERMAP-LFI
HTTP:PHP:YOUTUBE-BLOG-RFI
HTTP:PHP:STRIP-TAGS-XSS
HTTP:PHP:EGROUPWARE-FI
HTTP:PHP:MINIBB-MULTI-RFI
HTTP:PHP:MAMBO-PATH-INCL
HTTP:PHP:IBM-PROVENTIA-RFI
HTTP:PHP:XOOPS-BANNERS-LFI
HTTP:PHP:PHPADSNEW-RFI
HTTP:PHP:4IMAGES-RFI
HTTP:PHP:SQUERY-RFI
HTTP:PHP:PHPAUCTION-FI
HTTP:PHP:MULTI-PRODUCTS-RFI
HTTP:PHP:DBGUESTBOOK-DBSBASE
HTTP:PHP:427BB-AUTH-BYPASS
HTTP:PHP:ACGVCLICK-RFI
HTTP:PHP:ACAL-AUTH-BYPASS
HTTP:PHP:HPE-HPEINC-RFI
HTTP:PHP:DOCPILE-INIT-PATH
HTTP:PHP:ACTIVIST-BASE-RFI
HTTP:PHP:AKARRU-SOCIAL-RFI
HTTP:PHP:FREE-FILE-HOSTING-RFI
HTTP:PHP:TSEP-COLORSWITCH-RFI
HTTP:PHP:VS-NEWS-RFI
HTTP:PHP:MULTI-INDEX-PHP-RFI
HTTP:PHP:EMPIRE-CMS-RFI
HTTP:PHP:GENERIC-MEMBRES-RFI
HTTP:PHP:BEAUTIFIER-RFI
HTTP:PHP:OPENI-CMS-RFI
HTTP:PHP:SAVEWEB-PORTAL-RFI
HTTP:PHP:GESTART-RFI
HTTP:PHP:FLASHCHAT-RFI
HTTP:PHP:FCRING-RFI
HTTP:PHP:PHPSECUREPAGE-RFI
HTTP:PHP:VMIST-ART-RFI
HTTP:PHP:WMNEWS-RFI
HTTP:PHP:ANNONCESV-RFI
HTTP:PHP:RAXNET-CACTI-RCE
HTTP:PHP:AINS-AD-FUNDUM-RFI
HTTP:PHP:BOITE-DE-NEWS-RFI
HTTP:PHP:PHPBOOK-CODE-INJECTION
HTTP:PHP:ULTIMATE-FUN-BOOK-RFI
HTTP:PHP:BHARAT-MEDIARATTA-RFI
HTTP:PHP:MYNEWSGROUPS-RFI
HTTP:PHP:MYSQL-COMMANDER-RFI
HTTP:PHP:PHP-QUOT-PRINT-ENCODE
HTTP:PHP:PHP-CGI-CMD-LINE-RCE
HTTP:PHP:LWC-DATE-CMDINJ
HTTP:PHP:WP-ACF-ABSPATH-RFI
HTTP:PHP:APACHE-RQST-HEADER-BO
HTTP:PHP:ZONEMINDER-SERVER-CE
HTTP:PHP:JOOMLA-JE-STORY-LFI
HTTP:PHP:WP-WPTOUCH-REDIRECT
HTTP:PHP:JOOMLA-JMSFILESELL-LFI
HTTP:PHP:COPPERMINE-RCE
HTTP:PHP:HORDE-HREF-BACKDOOR
HTTP:PHP:WP-ANNOUNCES-RFI
HTTP:PHP:JOOMLA-OBSUGGEST-LFI
HTTP:PHP:JOOMLA-COM-PHOCADL-LFI
HTTP:PHP:WORDPRESS-WPCUSTOM-LFI
HTTP:PHP:PFSENSE-SNORT-INFO-DIS
HTTP:PHP:DATEINTERVAL-DOS
HTTP:PHP:XAMPP-FILE-WRITE
HTTP:PHP:V0PCR3W-WEB-SHELL-RCE
HTTP:PHP:OPENSSL-X509-CERT-MC
HTTP:PHP:FILEINFO-DOS

HTTP:PHP:GALLERY

HTTP:PHP:GALLERY:EMBED-AUTH
HTTP:PHP:GALLERY:EMBED-AUTH-VAR
HTTP:PHP:GALLERY:HTTP-VARS

HTTP:PHP:PHORUM

HTTP:PHP:PHORUM:REMOTE-EXEC
HTTP:PHP:PHORUM:ADMIN-PW-CHG
HTTP:PHP:PHORUM:READ-ACCESS
HTTP:PHP:PHORUM:RESPONSE-SPLIT

HTTP:PHP:PHPBB

HTTP:PHP:PHPBB:AVATAR-UPLOAD
HTTP:PHP:PHPBB:DL-SQL-INJ
HTTP:PHP:PHPBB:HIGHLIGHT-EXEC
HTTP:PHP:PHPBB:PM-SQL-USER
HTTP:PHP:PHPBB:SEARCH-DOS
HTTP:PHP:PHPBB:PROFILE-ADD-DOS
HTTP:PHP:PHPBB:AUTH-BYPASS
HTTP:PHP:PHPBB:LANG-EXEC
HTTP:PHP:PHPBB:UID-SQL-INJECT
HTTP:PHP:PHPBB:SEARCH-INJECT
HTTP:PHP:PHPBB:PROOTPATH-INJ
HTTP:PHP:PHPBB:AVATAR-PATH-INC
HTTP:PHP:PHPBB:SELECT-FISH
HTTP:PHP:PHPBB:PRIV-DEL

HTTP:PHP:PHPMYADMIN

HTTP:PHP:PHPMYADMIN:LOCALFILE
HTTP:PHP:PHPMYADMIN:SVR-PARAM
HTTP:PHP:PHPMYADMIN:FMT-OPTION
HTTP:PHP:PHPMYADMIN:SERVERDB
HTTP:PHP:PHPMYADMIN:PREG-REPLAC
HTTP:PHP:PHPMYADMIN:GOTO-RFI

HTTP:PHP:PHPNEWS

HTTP:PHP:PHPNEWS:SQL-SENDTO

HTTP:PHP:PHPNUKE

HTTP:PHP:PHPNUKE:BOOKMARK-SQL
HTTP:PHP:PHPNUKE:VIEWADMIN
HTTP:PHP:PHPNUKE:DELADMIN
HTTP:PHP:PHPNUKE:PRIV-ESC
HTTP:PHP:PHPNUKE:SID-SQL-INJECT
HTTP:PHP:PHPNUKE:QR-SQL-INJECT
HTTP:PHP:PHPNUKE:MODULES-DOS
HTTP:PHP:PHPNUKE:PATH-DISC2
HTTP:PHP:PHPNUKE:PATH-DISC1
HTTP:PHP:PHPNUKE:ADMIN-GUESS
HTTP:PHP:PHPNUKE:CID-SQL-INJECT
HTTP:PHP:PHPNUKE:4NALBUM-INC
HTTP:PHP:PHPNUKE:DOWNLD-SQL-INJ

HTTP:PHP:THATWARE

HTTP:PHP:THATWARE:CONFIG-INC
HTTP:PHP:THATWARE:ARTLIST-INC
HTTP:PHP:THATWARE:THATFILE-INC
HTTP:PHP:THATWARE:AUTH-INC

HTTP:PKG

HTTP:PKG:WEBMIN-BRUTE
HTTP:PKG:VWALL-FTPSAV-DLL
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-2
HTTP:PKG:CART32-CLI-DIS
HTTP:PKG:EZMALL-LOG-ORDER-ACCSS
HTTP:PKG:ICQ-WEBFRONT-DOS-2
HTTP:PKG:CART32-ADM-PW-CHG
HTTP:PKG:NAI-PGP-ADMIN-ACCESS-1
HTTP:PKG:EWAVE-SERVLET-DOS
HTTP:PKG:OFFICESCAN-JDKRQNOTIFY
HTTP:PKG:WEBGAIS-REMOTE-EXEC
HTTP:PKG:ALLAIRE-JRUN-DOS
HTTP:PKG:DNSTOOLS-AUTH-BYPASS
HTTP:PKG:CARELLO-VBEXEC
HTTP:PKG:SUPERSCOUT-USERLIST
HTTP:PKG:TUXEDO-DOS
HTTP:PKG:TUXEDO-INIFILE
HTTP:PKG:MS-JET-VBA
HTTP:PKG:WEBMIN-FAKE-SESSION
HTTP:PKG:WEBMIN-FILEDISC
HTTP:PKG:MOUNTAIN-WEBCART-DISC
HTTP:PKG:ANACONDA-DIR-TRAVERSAL
HTTP:PKG:SALESLOGIC-UNAUTH-ADMN
HTTP:PKG:WEBMIN-SHOWCGI-CMDEXEC
HTTP:PKG:NS-QUERY-PAT
HTTP:PKG:SALESLOGIX-AUTH-BYPASS
HTTP:PKG:DB4WEB-FILE-ACCESS

HTTP:PROXY

HTTP:PROXY:PROXYPRO-GET
HTTP:PROXY:SQUID-AT-AT
HTTP:PROXY:HTTP-PROXY-GET
HTTP:PROXY:SQUID-STRLISTGETITEM
HTTP:PROXY:CAW-URI-RES
HTTP:PROXY:WPAD-CONNECTION
HTTP:PROXY:SQUID-HEADER-DOS
HTTP:PROXY:SQUID-FTP
HTTP:PROXY:SQUID-CACHE-UPDATE
HTTP:PROXY:PSOPROXY-OF
HTTP:PROXY:SQUID-TRACE
HTTP:PROXY:WINGATE-OF
HTTP:PROXY:SQUID-OVERSIZE-HDR
HTTP:PROXY:SQUID-NULL-PTR
HTTP:PROXY:SQUID-NTLM-OF

HTTP:PROXY:ANON

HTTP:PROXY:ANON:PROXY-1
HTTP:PROXY:ANON:PROXY-2
HTTP:PROXY:ANON:CONCEAL-WS
HTTP:PROXY:ANON:CGIPROXY
HTTP:PROXY:ANON:FOXY-FILTER
HTTP:PROXY:ANON:PHPROXY

HTTP:PROXY:LIST

HTTP:PROXY:LIST:PROXYFIND
HTTP:PROXY:LIST:PUBWEBPROXIES

HTTP:REQERR

HTTP:REQERR:REQ-MISSING-HOST
HTTP:REQERR:REQ-INVALID-FORMAT
HTTP:REQERR:REQ-MALFORMED-URL
HTTP:REQERR:DOUBLE-ENCODE
HTTP:REQERR:BIN-DATA-CONT-LOC
HTTP:REQERR:BIN-DATA-ACC-ENC
HTTP:REQERR:FS-HOST
HTTP:REQERR:BIN-DATA-CONT-LANG
HTTP:REQERR:BIN-DATA-CONT-ENC
HTTP:REQERR:BIN-DATA-ACCEPT
HTTP:REQERR:HEADER-INJECT
HTTP:REQERR:BIN-DATA-AUTH
HTTP:REQERR:REQ-INJECTION
HTTP:REQERR:URL-VAR-FS
HTTP:REQERR:URL-LF-CR
HTTP:REQERR:INV-HTTP-VERSION
HTTP:REQERR:MALFORMED-AUTH
HTTP:REQERR:BIN-DATA-HEADER
HTTP:REQERR:NULL-IN-HEADER
HTTP:REQERR:POST-MISSING-DATA
HTTP:REQERR:INV-IPV6-HOST-HDR

HTTP:SAVANT

HTTP:SAVANT:GET-PERCENT
HTTP:SAVANT:GET-DOT1

HTTP:SQL:INJ

HTTP:SQL:INJ:OSCOM
HTTP:SQL:INJ:IS_SRVROLEMEMBER
HTTP:SQL:INJ:SYSOBJECTS
HTTP:SQL:INJ:WS2000
HTTP:SQL:INJ:TOLINET-AGENCIA-ID
HTTP:SQL:INJ:JOOMLA-CBCONTACT
HTTP:SQL:INJ:JOOMLA-COMHOSPITAL
HTTP:SQL:INJ:JOOMLA-CONTROLLER
HTTP:SQL:INJ:JOOMLA-FOTO
HTTP:SQL:INJ:JOOMLA-NEWSSEARCH
HTTP:SQL:INJ:WP-SQL
HTTP:SQL:INJ:AND-NUMBER-EQUALS
HTTP:SQL:INJ:JOOMLA-AVRELOADED
HTTP:SQL:INJ:SFX-SQLI
HTTP:SQL:INJ:HEADER-2
HTTP:SQL:INJ:HEADER-3
HTTP:SQL:INJ:SYNERGY-SW
HTTP:SQL:INJ:WAITFOR-DELAY
HTTP:SQL:INJ:FACTO-CMS
HTTP:SQL:INJ:MYSHOP
HTTP:SQL:INJ:POSTNUKE
HTTP:SQL:INJ:PHPTOPSITES
HTTP:SQL:INJ:REMOTE-EXEC
HTTP:SQL:INJ:GLOBAL-VAR
HTTP:SQL:INJ:PANGOLIN
HTTP:SQL:INJ:SQLMAP-ACTIVITY
HTTP:SQL:INJ:CONVERT-INJ-OF
HTTP:SQL:INJ:AUTHID
HTTP:SQL:INJ:JOOMLA-COM-JCE
HTTP:SQL:INJ:OMNISTAR-MAILER
HTTP:SQL:INJ:PROC-GENERIC
HTTP:SQL:INJ:YABSOFT-GALLERY-ID
HTTP:SQL:INJ:MNG-ENG-SECMNG-PLS
HTTP:SQL:INJ:MYSQL-BINLOG-DOS
HTTP:SQL:INJ:JOOMLA-FILTERORDER
HTTP:SQL:INJ:JOOMLA-VIRTUAL-MEM
HTTP:SQL:INJ:AUTO-TRANS
HTTP:SQL:INJ:WP-MEDIA-LIBRARY
HTTP:SQL:INJ:SYMC-BLOCKED-PHP
HTTP:SQL:INJ:MAIAN-WEBLOG
HTTP:SQL:INJ:KUBELABS-PHPDUG
HTTP:SQL:INJ:WP-UNIVERSAL-POST
HTTP:SQL:INJ:JOOSTINA
HTTP:SQL:INJ:MAMBO-COM-DOCMAN
HTTP:SQL:INJ:JOOMLA-MAPLOCATOR
HTTP:SQL:INJ:JOOMLA-QUESTION
HTTP:SQL:INJ:WP-STARSRATEBOX
HTTP:SQL:INJ:TEDE-SIMPLIFICADO
HTTP:SQL:INJ:JOOMLA-ALLCINEVID
HTTP:SQL:INJ:JOOMLA-COM-JOOMNIK
HTTP:SQL:INJ:JOOMLA-COM-SHOP
HTTP:SQL:INJ:WP-SERMON-BROWSER
HTTP:SQL:INJ:4IMAGES-DETAIL-PHP
HTTP:SQL:INJ:JOOMLA-RESTAURANTE
HTTP:SQL:INJ:JOOMLA-JUICY-PICID
HTTP:SQL:INJ:MERCURY-UA
HTTP:SQL:INJ:JOOMLA-FAQ-BOOK
HTTP:SQL:INJ:JOOMLA-COMTEAM
HTTP:SQL:INJ:JOOMLA-CALCBUILDER
HTTP:SQL:INJ:JOOMLA-COM-CLAN
HTTP:SQL:INJ:WORDPRESS-WP-FRM
HTTP:SQL:INJ:COVER-VISION-ID
HTTP:SQL:INJ:NULLBYTE-COMMENT
HTTP:SQL:INJ:WP-PHOTORACER
HTTP:SQL:INJ:WORDPRESS-ID
HTTP:SQL:INJ:HAVIJ-UA
HTTP:SQL:INJ:CHAR-ENCODE
HTTP:SQL:INJ:DH-MLM-LOGIN-PHP
HTTP:SQL:INJ:WP-SYMPOSIUM
HTTP:SQL:INJ:MYSCHOOL
HTTP:SQL:INJ:SYNDEO-CMS-USRNAME
HTTP:SQL:INJ:WP-ECOMMERCE
HTTP:SQL:INJ:USER-ADD
HTTP:SQL:INJ:MS-SQL-FUNCTIONS
HTTP:SQL:INJ:CA-TOTAL-DEFENSE
HTTP:SQL:INJ:MS-SQL-TABLE-NAME
HTTP:SQL:INJ:WP-AJAX-CATEGORY
HTTP:SQL:INJ:AGENT-ADMIN
HTTP:SQL:INJ:CHAR
HTTP:SQL:INJ:BTTLXEFORUM
HTTP:SQL:INJ:WP-MULTIPLE
HTTP:SQL:INJ:CONCAT
HTTP:SQL:INJ:CMD-IN-URL
HTTP:SQL:INJ:CISCO-UCM
HTTP:SQL:INJ:CA-TOTAL-UNCWS
HTTP:SQL:INJ:CMD-CHAIN-2
HTTP:SQL:INJ:UNION-SELECT
HTTP:SQL:INJ:COMPARISON
HTTP:SQL:INJ:DECLARE-EXEC
HTTP:SQL:INJ:GENERIC
HTTP:SQL:INJ:IISPROTECT
HTTP:SQL:INJ:IMP
HTTP:SQL:INJ:HEADER-1
HTTP:SQL:INJ:CONVERT
HTTP:SQL:INJ:JOOMLA-VIRTUEMART
HTTP:SQL:INJ:SELECT-SUB-DOS
HTTP:SQL:INJ:L-FORUM
HTTP:SQL:INJ:NULL-NULL-NULL
HTTP:SQL:INJ:JOOMLA-ALPHA-EMAIL
HTTP:SQL:INJ:INTO-OUTFILE
HTTP:SQL:INJ:JOOMLA-MORFEOSHOW
HTTP:SQL:INJ:RUBY-ON-RAILS
HTTP:SQL:INJ:HEADER-REFERRER
HTTP:SQL:INJ:CA-EXPORTREPORT
HTTP:SQL:INJ:F5-BIGIP-11.2.0
HTTP:SQL:INJ:TIVOLI-USER-UPDATE
HTTP:SQL:INJ:SYMANTEC-IM
HTTP:SQL:INJ:HEADER-COOKIE
HTTP:SQL:INJ:JOOMLA-COM-CCBOARD
HTTP:SQL:INJ:SLASH-STAR
HTTP:SQL:INJ:PARALLEL-PLESK
HTTP:SQL:INJ:PL-SQL
HTTP:SQL:INJ:MYSQL-PRIV-ESCAL
HTTP:SQL:INJ:BIT5-BLOG
HTTP:SQL:INJ:XPCMDSHELL
HTTP:SQL:INJ:FORUM-LIVRE
HTTP:SQL:INJ:WP-EVENTS-MGR
HTTP:SQL:INJ:WP-GD-STAR-RATING
HTTP:SQL:INJ:VENOM-BOARD
HTTP:SQL:INJ:WP-SUPER-CAPTCHA
HTTP:SQL:INJ:WEBID-BLIND-SQL
HTTP:SQL:INJ:EXEC-MASTER
HTTP:SQL:INJ:THEWEBFORUM-LOGIN
HTTP:SQL:INJ:COMMENT
HTTP:SQL:INJ:JOOMLA-AD-DJ
HTTP:SQL:INJ:S9Y-SERENDIPITY
HTTP:SQL:INJ:WORD-CIRCLE-SQL
HTTP:SQL:INJ:SLRWINDS-STORG-MGR
HTTP:SQL:INJ:DELL-SONICWALL
HTTP:SQL:INJ:VEGO-SQL-INJ
HTTP:SQL:INJ:ADMENTOR-ADMIN
HTTP:SQL:INJ:ACTIVECAMPAIGN
HTTP:SQL:INJ:SCOZNET-ADMINNAME
HTTP:SQL:INJ:VERSION-DETECT
HTTP:SQL:INJ:MYSQL-TABLE-NAME
HTTP:SQL:INJ:RATIONAL-CLRQST
HTTP:SQL:INJ:MCAFEE-EMAIL-GTWAY
HTTP:SQL:INJ:INSERT-VALUES
HTTP:SQL:INJ:ALTER-MYSQL
HTTP:SQL:INJ:MANAGE-ENGINE-SM
HTTP:SQL:INJ:BIZTALK
HTTP:SQL:INJ:CMD-CHAIN-1

HTTP:STC

HTTP:STC:ROOTKIT-DL
HTTP:STC:MPG123-STEREO-OF
HTTP:STC:MHTML-CDI
HTTP:STC:SYMANTEC-AV-STACK
HTTP:STC:QTIME-TEXTBOX-MEMC
HTTP:STC:HHP-PARA-OF
HTTP:STC:LOTUS-CAI-URI
HTTP:STC:IE-INDEX
HTTP:STC:WIN-SHELLHNDL
HTTP:STC:DIRECTSHOW-AVI-EXEC
HTTP:STC:ITUNES-HANDLER-OF
HTTP:STC:X11-OVERSIZE-FONT
HTTP:STC:MCAFEE-FILE-NAME-OF
HTTP:STC:SUSPICIOUS-JS-FUNC
HTTP:STC:PPT-LONGNAME
HTTP:STC:APPLE-CFNETWORK-DOS
HTTP:STC:MIRC-URI-OF
HTTP:STC:BLACKBERRY-SVR-DOS
HTTP:STC:WGET-REDIRECT
HTTP:STC:AV-MAGIC-EVADE
HTTP:STC:XMPLAY-ASX
HTTP:STC:IBM-IIM-URI-EXEC
HTTP:STC:BROWSER-RUBY-BLOCK
HTTP:STC:IE-STREAM-HDR
HTTP:STC:SBS-TRAIN
HTTP:STC:JSXX-OBFS-JS
HTTP:STC:CACHETIME
HTTP:STC:DESKTOP-INI-CODE-EXE
HTTP:STC:W32-PARAM-HTTP
HTTP:STC:NAV-REDIR
HTTP:STC:SKYPE4COM
HTTP:STC:SILVERLIGHT-MEM-CORR
HTTP:STC:APPLE-ICHAT
HTTP:STC:SILVERLIGHT-RCE
HTTP:STC:FF-NAV-URI
HTTP:STC:SAFARI-IE-RCE
HTTP:STC:HEADER-UTF7
HTTP:STC:OBJ-FILE-BASE64
HTTP:STC:FILE-UTF7
HTTP:STC:APPLE-QTIME-DREF-BO
HTTP:STC:GOOGLE-APP-MAILTO
HTTP:STC:CSS-STATUS-BAR-SPOOF
HTTP:STC:URI-INJ
HTTP:STC:DOTNET-FRAMEWORK-RCE
HTTP:STC:WINDOWS-FAX-COVER
HTTP:STC:WIN-CCL-BOF
HTTP:STC:WEBEX-WRF-BOF
HTTP:STC:DOTNET-BUFF-ALLOC
HTTP:STC:DAVREDIR
HTTP:STC:HIDDEN-IFRAME
HTTP:STC:TRIMBL-NAV-BMP-HOVF
HTTP:STC:BROWSER-FLOAT-STYLE-MC
HTTP:STC:IMTOO-MPEG-ENCODER-BO
HTTP:STC:DTOA-MC
HTTP:STC:GD-GRAPHICSLIB-BOF
HTTP:STC:WHSC-RCE
HTTP:STC:BROWSER-DISPLAY-BOX-MC
HTTP:STC:AV-GATEWAY-BYPASS
HTTP:STC:WIRESHARK-INSECUREPATH
HTTP:STC:SEARCH-LINK
HTTP:STC:MS-OBJ-PACKAGER
HTTP:STC:CODESIGHS-BOF
HTTP:STC:DOT-NET-REFLECTION
HTTP:STC:LITESPEED-CSRF
HTTP:STC:ITUNES-PL
HTTP:STC:QT-RTSP-LINK-OF
HTTP:STC:WIN32KSYS-MEM
HTTP:STC:CHAR-CONFLICT
HTTP:STC:RESIZE-DOS
HTTP:STC:MS-WINDOWS-FILE-BOF
HTTP:STC:M3U-VLC-SMB-LINK
HTTP:STC:ABOUT-JAVASCRIPT
HTTP:STC:KDE-LIBKHTML-DOS
HTTP:STC:JS-DATA-SCHEME
HTTP:STC:NESTED-XML-DOS
HTTP:STC:OOVOO-URI-BOF
HTTP:STC:CPANEL-REQUEST-FORGERY
HTTP:STC:FOXMAIL-MAILTO-BO
HTTP:STC:MEDIAMONKEY-URI-DOS
HTTP:STC:BELKIN-RUTR-AUTH-BYPAS
HTTP:STC:ALINK-WIRLES-RUTR-CSRF
HTTP:STC:SONICWALL-VPN-FS
HTTP:STC:RUBY-PROT-FRM-FGY-CSRF
HTTP:STC:NOKIA-S60-SORT-DOS
HTTP:STC:BUFFALO-AIRSTATON-CSRF
HTTP:STC:WEBKIT-ONLOAD-CDS
HTTP:STC:RMOC3260-DLL-MC
HTTP:STC:MS-EXCEL-JAVSCRIPT-DOS
HTTP:STC:KDE-KONQUEROR-FTP-DOS
HTTP:STC:OLE-AUTO-RCE
HTTP:STC:MS-DOTNET-NAMESPACE-BO
HTTP:STC:DOTNET-WINFORMS-RCE
HTTP:STC:OLE-SHELL
HTTP:STC:GOOGLE-CHROME-UAF
HTTP:STC:VAR-EQUALS-REDIRECT
HTTP:STC:SILVERLIGHT-MEM-COR
HTTP:STC:CPTEXIMG2D-IO
HTTP:STC:APPENDED-MAL-JS
HTTP:STC:SUSPICIOUS-JS-EVASION
HTTP:STC:MALFORMED-RESPONSE
HTTP:STC:HIDDEN-IFRAME-2
HTTP:STC:SUSPICIOUS-JS-ALPHA
HTTP:STC:COREL-WP-BOF
HTTP:STC:WMF-FILE-DOS
HTTP:STC:FILE-UPLOAD
HTTP:STC:MS-OFFICE-XP-HTML-LINK
HTTP:STC:HPJ-OPTIONS
HTTP:STC:MSA-SPOOF
HTTP:STC:GOOGLE-SKETCHUP-PICT
HTTP:STC:ORBIT-DL-URL
HTTP:STC:DOT-NET-ARRAY-RCE
HTTP:STC:WLW-INFO-DISC
HTTP:STC:MS-FRONTPAGE-INFO-DISC
HTTP:STC:FIREFOX-LOOKUP-GETTER
HTTP:STC:EMBED-SRC-OF
HTTP:STC:TELNET-URL-OPTS
HTTP:STC:MS-JSCRIPT-ENGINE-RCE
HTTP:STC:SKYPE-URI-HANDLER
HTTP:STC:MSXML-XSLT-RCE
HTTP:STC:FAX-COVER-MC
HTTP:STC:MS-DIRECTSHOW-GIF-RCE
HTTP:STC:FF-SRIALIZE-STREAM-UAF
HTTP:STC:PAJAX-RCE
HTTP:STC:RHINO-HDR-OF
HTTP:STC:VLC-ABC-HOVF
HTTP:STC:WEBKIT-FLOAT-TYPE-RCE
HTTP:STC:DOTNET-XML-SIG-SPOOF
HTTP:STC:IBM-OMNIFIND-CSRF
HTTP:STC:DATA-SCHEME
HTTP:STC:MICROSOFT-GDI-TIFF-RCE
HTTP:STC:SILVERLIGHT-INFO-DISC
HTTP:STC:CANVAS-BABYBOTTLE
HTTP:STC:BROWSER-HTMLSLTELT-DOS
HTTP:STC:APPLE-QTIME-ENOF-OF
HTTP:STC:CANVAS-BABYBOTTLE-GZIP
HTTP:STC:DOTNET-SERIALIZATION
HTTP:STC:HHP-BINARY
HTTP:STC:DIRECTX-AVI-WAV-PARSE
HTTP:STC:MS-OFFICE-FILE-BOF
HTTP:STC:WINHELP32-MSGBOX-RCE
HTTP:STC:WINHELP32-OF2
HTTP:STC:MS-FOREFRONT-RCE
HTTP:STC:PPT-CRAFTED-PATH
HTTP:STC:MS-WORD-CVE-2013-1325
HTTP:STC:ON-BEFORE-UNLOAD
HTTP:STC:RSS-FEED-CODE-INJ
HTTP:STC:NOTES-INI
HTTP:STC:CHTSKDIC
HTTP:STC:DOT-NET-RCE
HTTP:STC:CSS-RELOADED

HTTP:STC:ACTIVEX

HTTP:STC:ACTIVEX:HP
HTTP:STC:ACTIVEX:BACKDOORS
HTTP:STC:ACTIVEX:SYGATE-SSHELP
HTTP:STC:ACTIVEX:ADODB-CONNECT
HTTP:STC:ACTIVEX:BB-LOAD
HTTP:STC:ACTIVEX:CA-PSFORMX-AX
HTTP:STC:ACTIVEX:RDP-UNSAFE-AX
HTTP:STC:ACTIVEX:EBAY
HTTP:STC:ACTIVEX:CA-WEBSCAN-AX
HTTP:STC:ACTIVEX:ASK-COM
HTTP:STC:ACTIVEX:EBOOK-FLIP
HTTP:STC:ACTIVEX:MCA-VTRACE
HTTP:STC:ACTIVEX:ROXIO-CINEPL
HTTP:STC:ACTIVEX:SOFTARTISANS
HTTP:STC:ACTIVEX:VERYPDF
HTTP:STC:ACTIVEX:WINDVD7
HTTP:STC:ACTIVEX:GRPWISE-GIXMIM
HTTP:STC:ACTIVEX:CTSUENG-OCX
HTTP:STC:ACTIVEX:AKAMAI-DM
HTTP:STC:ACTIVEX:BSTORM-WINGRPH
HTTP:STC:ACTIVEX:HPUPDATE
HTTP:STC:ACTIVEX:SYMFAX
HTTP:STC:ACTIVEX:ALTIRIS
HTTP:STC:ACTIVEX:BLACKICE
HTTP:STC:ACTIVEX:LIVE-MSG
HTTP:STC:ACTIVEX:PESTPATROL
HTTP:STC:ACTIVEX:SONY-WIFIMAN
HTTP:STC:ACTIVEX:THREEDIFY-BOF
HTTP:STC:ACTIVEX:GEOVISON-LIVEX
HTTP:STC:ACTIVEX:CODEBASE-2
HTTP:STC:ACTIVEX:MW6-MAXICODE
HTTP:STC:ACTIVEX:CISCO-VPN
HTTP:STC:ACTIVEX:ZENTURI
HTTP:STC:ACTIVEX:UNCOMMON-AX
HTTP:STC:ACTIVEX:MOROVIA-BARCOD
HTTP:STC:ACTIVEX:DLINK-DCS-5605
HTTP:STC:ACTIVEX:TRENDNET
HTTP:STC:ACTIVEX:QUEST-PNLLMCLI
HTTP:STC:ACTIVEX:YMAILATTACH-OF
HTTP:STC:ACTIVEX:SAM-CONNECTDDN
HTTP:STC:ACTIVEX:OFFICE-OCX
HTTP:STC:ACTIVEX:ACTI-NETWORK
HTTP:STC:ACTIVEX:HPSUPPORT
HTTP:STC:ACTIVEX:MCFE-OVERWRITE
HTTP:STC:ACTIVEX:SAPI-DLL
HTTP:STC:ACTIVEX:WINIMGLOG
HTTP:STC:ACTIVEX:OLE-AUTO
HTTP:STC:ACTIVEX:AXVLC
HTTP:STC:ACTIVEX:YSHORTCUT
HTTP:STC:ACTIVEX:RWSO
HTTP:STC:ACTIVEX:MACINSTALL
HTTP:STC:ACTIVEX:HPVIRTUAL
HTTP:STC:ACTIVEX:CISCO-CSD-WEB
HTTP:STC:ACTIVEX:IRFILEIOSRVC
HTTP:STC:ACTIVEX:WMEX
HTTP:STC:ACTIVEX:PDWIZARD
HTTP:STC:ACTIVEX:GATEWAYX
HTTP:STC:ACTIVEX:BACKWEB-LIA
HTTP:STC:ACTIVEX:TM-OS
HTTP:STC:ACTIVEX:DATASRCCTL
HTTP:STC:ACTIVEX:REVEALTRANS
HTTP:STC:ACTIVEX:HTMLSAFHLP
HTTP:STC:ACTIVEX:QUEST-INTRUST
HTTP:STC:ACTIVEX:MAL-CON-2
HTTP:STC:ACTIVEX:TRIEDITDOC
HTTP:STC:ACTIVEX:SQLVDIR-DLL
HTTP:STC:ACTIVEX:VMWARE
HTTP:STC:ACTIVEX:VIELIB
HTTP:STC:ACTIVEX:ADESK-AX
HTTP:STC:ACTIVEX:JETAUDIO-DIR
HTTP:STC:ACTIVEX:LINKSYS
HTTP:STC:ACTIVEX:TM-HOUSECALL
HTTP:STC:ACTIVEX:HUSDAWG
HTTP:STC:ACTIVEX:VIDEOCALL
HTTP:STC:ACTIVEX:REAL-PLAYER
HTTP:STC:ACTIVEX:DERIVO
HTTP:STC:ACTIVEX:QUEST-TOAD-DBA
HTTP:STC:ACTIVEX:QUEST-RCE
HTTP:STC:ACTIVEX:SAP-IRRFC-OF
HTTP:STC:ACTIVEX:SAP-BEXGLOBAL
HTTP:STC:ACTIVEX:EASYMAIL-CNCT
HTTP:STC:ACTIVEX:GOMPLAYER
HTTP:STC:ACTIVEX:WINZIP-CMDLINE
HTTP:STC:ACTIVEX:DELL-INFO-DISC
HTTP:STC:ACTIVEX:CA-XMLSECDB
HTTP:STC:ACTIVEX:HHCTRL-IMAGE
HTTP:STC:ACTIVEX:DX-PLY-CMD-INJ
HTTP:STC:ACTIVEX:WFICA
HTTP:STC:ACTIVEX:CRYSTAL-PRINT
HTTP:STC:ACTIVEX:JVIEWPRO
HTTP:STC:ACTIVEX:EDRAW-LIC-NAME
HTTP:STC:ACTIVEX:UBISOFT-UPLAY
HTTP:STC:ACTIVEX:CAMTRON-CMNC
HTTP:STC:ACTIVEX:EASEWE-FTP
HTTP:STC:ACTIVEX:UUSEE-UUPLAYER
HTTP:STC:ACTIVEX:GE-HISTORIAN
HTTP:STC:ACTIVEX:HP-EASY-XML
HTTP:STC:ACTIVEX:REAL-GAMEHOUSE
HTTP:STC:ACTIVEX:HP-EASYPRINTER
HTTP:STC:ACTIVEX:GUI-CM-CTRLS
HTTP:STC:ACTIVEX:ADOBE-DL-MGR
HTTP:STC:ACTIVEX:HYLEOS
HTTP:STC:ACTIVEX:EASY-GRID
HTTP:STC:ACTIVEX:IBM-SPSS-EXHTM
HTTP:STC:ACTIVEX:EMV-PIXTOOLS
HTTP:STC:ACTIVEX:IMERA-SYS
HTTP:STC:ACTIVEX:IDAUTOMATION
HTTP:STC:ACTIVEX:HP-APP-LIFE
HTTP:STC:ACTIVEX:IMAGE-VIEWER
HTTP:STC:ACTIVEX:EASYMAIL-OBJ
HTTP:STC:ACTIVEX:DATA-DYNAMICS
HTTP:STC:ACTIVEX:IMESH-IMWEBCON
HTTP:STC:ACTIVEX:ISIS-AFP-BO
HTTP:STC:ACTIVEX:LEADTOOLS
HTTP:STC:ACTIVEX:ADDCOLUMN
HTTP:STC:ACTIVEX:SAMSUNG-NET-I
HTTP:STC:ACTIVEX:CHILLKAT-CRYPT
HTTP:STC:ACTIVEX:WONDERWARE
HTTP:STC:ACTIVEX:HP-AUDIO-REC
HTTP:STC:ACTIVEX:HP-MERC-CLR
HTTP:STC:ACTIVEX:JRE-DNSRESOLVE
HTTP:STC:ACTIVEX:SOLARWINDS-BO
HTTP:STC:ACTIVEX:DRM-MSNETOBJ
HTTP:STC:ACTIVEX:GDPICTUREPRO
HTTP:STC:ACTIVEX:MAPGUIDE-LAYER
HTTP:STC:ACTIVEX:CHILKAT-ZIP
HTTP:STC:ACTIVEX:ORACLE-SIEBEL
HTTP:STC:ACTIVEX:WMI-ADMIN
HTTP:STC:ACTIVEX:SOPCAST-CNAME
HTTP:STC:ACTIVEX:SAMSUNG-BACKUP
HTTP:STC:ACTIVEX:CRYSTAL-SEARCH
HTTP:STC:ACTIVEX:OFFICEVIEW-DOS
HTTP:STC:ACTIVEX:MCFEE-MCINSCTL
HTTP:STC:ACTIVEX:LTOCXTWAINU
HTTP:STC:ACTIVEX:INST-SHLD-FO
HTTP:STC:ACTIVEX:MOVIE-PLAYER
HTTP:STC:ACTIVEX:MSXML2-MEMCORR
HTTP:STC:ACTIVEX:ARGOSOFT-MAIL
HTTP:STC:ACTIVEX:SAP-CRSTL-RPT
HTTP:STC:ACTIVEX:SASCAM-WEBCAM
HTTP:STC:ACTIVEX:ORACLE-DOC-CAP
HTTP:STC:ACTIVEX:PBEMAIL
HTTP:STC:ACTIVEX:MS-OWC-BOF
HTTP:STC:ACTIVEX:ORACLE-CROPROJ
HTTP:STC:ACTIVEX:AVAYA-ONE-X
HTTP:STC:ACTIVEX:EDRAW-OFF-BOF
HTTP:STC:ACTIVEX:FLEXCELL-GRID
HTTP:STC:ACTIVEX:MOXA-PFILENAME
HTTP:STC:ACTIVEX:GESTEC-ELONFMT
HTTP:STC:ACTIVEX:ALADDIN
HTTP:STC:ACTIVEX:LIVE-WRITER
HTTP:STC:ACTIVEX:CHILKAT-FTP2
HTTP:STC:ACTIVEX:SIGPLUS-PRO
HTTP:STC:ACTIVEX:SAMSUNG-KIES
HTTP:STC:ACTIVEX:PRECISIONID
HTTP:STC:ACTIVEX:URLMON-DLL
HTTP:STC:ACTIVEX:MSO-DATASRC
HTTP:STC:ACTIVEX:WATCHFIRE
HTTP:STC:ACTIVEX:MS-SQLDMO
HTTP:STC:ACTIVEX:CA-ETRUST
HTTP:STC:ACTIVEX:VB-TLBINF32
HTTP:STC:ACTIVEX:VISAGESOFT-PDF
HTTP:STC:ACTIVEX:SYMC-NAVCOMUI
HTTP:STC:ACTIVEX:REAL-IERPCTL
HTTP:STC:ACTIVEX:TEECHARTPRO-OF
HTTP:STC:ACTIVEX:QUICKTIME-BOF
HTTP:STC:ACTIVEX:ABB-CWGRAPH3D
HTTP:STC:ACTIVEX:WKIMGSRV
HTTP:STC:ACTIVEX:REAL-IEFRAME
HTTP:STC:ACTIVEX:PCVUE-SCADA
HTTP:STC:ACTIVEX:MSCOMM32
HTTP:STC:ACTIVEX:DELL-SCANNER
HTTP:STC:ACTIVEX:BARCODEWIZ
HTTP:STC:ACTIVEX:CYGNICON
HTTP:STC:ACTIVEX:IBMINTS-INT-OF
HTTP:STC:ACTIVEX:SYMC-APPSTEAM
HTTP:STC:ACTIVEX:BLACKICE-PRNT
HTTP:STC:ACTIVEX:CITRIX-NSEPA
HTTP:STC:ACTIVEX:BLACKICE-SDK
HTTP:STC:ACTIVEX:DECISIONTOOLS
HTTP:STC:ACTIVEX:PHOTOBASIC-AX
HTTP:STC:ACTIVEX:AURIGMAIMG
HTTP:STC:ACTIVEX:IDEFENSE-COM
HTTP:STC:ACTIVEX:PEACHTREE
HTTP:STC:ACTIVEX:PRO-SOFTNET
HTTP:STC:ACTIVEX:NOVELL-CLIENT
HTTP:STC:ACTIVEX:MDAC-DATASPACE
HTTP:STC:ACTIVEX:MSVIDCTL-2
HTTP:STC:ACTIVEX:SAPGUI-AX
HTTP:STC:ACTIVEX:AWINGSOFT
HTTP:STC:ACTIVEX:TUMBLEWEED
HTTP:STC:ACTIVEX:CLEARQUEST-OLE
HTTP:STC:ACTIVEX:ANSMTP
HTTP:STC:ACTIVEX:SKINCRAFTER-OF
HTTP:STC:ACTIVEX:SAP-WEBBVIEWER
HTTP:STC:ACTIVEX:JNPR-SSL-VPN
HTTP:STC:ACTIVEX:ICQPHONE-EXEC
HTTP:STC:ACTIVEX:SIEMENS-AUTO
HTTP:STC:ACTIVEX:HP-XUPLOAD-OCX
HTTP:STC:ACTIVEX:PVCAL
HTTP:STC:ACTIVEX:EASYMAIL-EXP
HTTP:STC:ACTIVEX:RKD-BARCODE
HTTP:STC:ACTIVEX:FACEBOOK-PHOTO
HTTP:STC:ACTIVEX:IBM-LOTUS-QIKR
HTTP:STC:ACTIVEX:SAP-GUI-TABONE
HTTP:STC:ACTIVEX:IBIZ-E-BANKING
HTTP:STC:ACTIVEX:WIN-SHELL-USER
HTTP:STC:ACTIVEX:CRYSTAL-REPORT
HTTP:STC:ACTIVEX:LEADTOOLS-JPEG
HTTP:STC:ACTIVEX:WINDOWS-DRM
HTTP:STC:ACTIVEX:MS-OUTLOOK
HTTP:STC:ACTIVEX:PICTUREPUSHER
HTTP:STC:ACTIVEX:SYNCTS-FILE-OW
HTTP:STC:ACTIVEX:MACROVISION
HTTP:STC:ACTIVEX:KINGVIEW
HTTP:STC:ACTIVEX:HUMMINGBIRD
HTTP:STC:ACTIVEX:PROMOTIC
HTTP:STC:ACTIVEX:FATH-FTP
HTTP:STC:ACTIVEX:DART-SERVICE
HTTP:STC:ACTIVEX:KINGSOFT
HTTP:STC:ACTIVEX:TM-ISP-2010
HTTP:STC:ACTIVEX:HP-INFO-CENTER
HTTP:STC:ACTIVEX:SNOOPYCTRL
HTTP:STC:ACTIVEX:ORACLE-TTF16
HTTP:STC:ACTIVEX:AOL-PHOBOS
HTTP:STC:ACTIVEX:BENNET-TEC
HTTP:STC:ACTIVEX:FLEXERA
HTTP:STC:ACTIVEX:HP-PROTECT-DAM
HTTP:STC:ACTIVEX:SONICWALL-VPN
HTTP:STC:ACTIVEX:NTR-BOF
HTTP:STC:ACTIVEX:C6-URL-DL
HTTP:STC:ACTIVEX:AXIS-CAMERA
HTTP:STC:ACTIVEX:YAHOO-CD-PLY
HTTP:STC:ACTIVEX:IBM-RATIONAL
HTTP:STC:ACTIVEX:IBM-VSVIEW6
HTTP:STC:ACTIVEX:EDRAW-VIEWER
HTTP:STC:ACTIVEX:MCAFEE-MYCIO
HTTP:STC:ACTIVEX:CO-FLEXGRID
HTTP:STC:ACTIVEX:AUTODESK-IDROP
HTTP:STC:ACTIVEX:ASUS-NETSWITCH
HTTP:STC:ACTIVEX:SUNWAY
HTTP:STC:ACTIVEX:EASYMAIL-IMAP4
HTTP:STC:ACTIVEX:EMC-KEYHELP
HTTP:STC:ACTIVEX:2X-APPLICATION
HTTP:STC:ACTIVEX:PROMOTIC-RCE
HTTP:STC:ACTIVEX:MW6-BARCODE
HTTP:STC:ACTIVEX:MSACCESS-AX
HTTP:STC:ACTIVEX:MS-ICARDIE
HTTP:STC:ACTIVEX:HP-LOADRUNER
HTTP:STC:ACTIVEX:F-SECURE-MC
HTTP:STC:ACTIVEX:NETCRAFT
HTTP:STC:ACTIVEX:VMWARE-INTRA
HTTP:STC:ACTIVEX:ADVANCED-FILE
HTTP:STC:ACTIVEX:IMAGESHACK
HTTP:STC:ACTIVEX:NEWCOMMON-OCX
HTTP:STC:ACTIVEX:ECAVA
HTTP:STC:ACTIVEX:DBPOWERAMP
HTTP:STC:ACTIVEX:NOKIA-PHOENIX
HTTP:STC:ACTIVEX:EASYMAIL-SMTP
HTTP:STC:ACTIVEX:FLASH9D-CSS
HTTP:STC:ACTIVEX:HP-SW-UPDATE
HTTP:STC:ACTIVEX:DELL-WEBCAM
HTTP:STC:ACTIVEX:HMNGBRD-DEPWIZ
HTTP:STC:ACTIVEX:IBM-INOTES-BOF
HTTP:STC:ACTIVEX:CLSID-OBFUS
HTTP:STC:ACTIVEX:AURIGMA
HTTP:STC:ACTIVEX:YAHOO-AUDIO
HTTP:STC:ACTIVEX:LPVIEWER
HTTP:STC:ACTIVEX:MOVE-PLAYER
HTTP:STC:ACTIVEX:AOL-PIC-EDITOR
HTTP:STC:ACTIVEX:SECOND-SIGHT
HTTP:STC:ACTIVEX:REDIFFBOL
HTTP:STC:ACTIVEX:MYSPACE-UPLOAD
HTTP:STC:ACTIVEX:CHILKAT-SOCKET
HTTP:STC:ACTIVEX:BAOFENG-BO
HTTP:STC:ACTIVEX:FLASH-ALOSCRPT
HTTP:STC:ACTIVEX:CHILKAT-CRYPT
HTTP:STC:ACTIVEX:SYMC-CLIPROXY
HTTP:STC:ACTIVEX:LEADTOOLS-LTMM
HTTP:STC:ACTIVEX:STREAM-AUDIO
HTTP:STC:ACTIVEX:CLEVER-INTERNT
HTTP:STC:ACTIVEX:CHINAGAMES
HTTP:STC:ACTIVEX:OVCTL
HTTP:STC:ACTIVEX:YAHOO-RCE
HTTP:STC:ACTIVEX:DIVX-PLAYER
HTTP:STC:ACTIVEX:DXTMSFT
HTTP:STC:ACTIVEX:DAXCTLE
HTTP:STC:ACTIVEX:YAHOO-MSG
HTTP:STC:ACTIVEX:AOA-DVD-BOF
HTTP:STC:ACTIVEX:REAL-PLR-RPAU
HTTP:STC:ACTIVEX:SOFTEK-BOF
HTTP:STC:ACTIVEX:ATUCFOBJ-DLL
HTTP:STC:ACTIVEX:SMARTVMD-BOF
HTTP:STC:ACTIVEX:YAHO-YNOTIFIER
HTTP:STC:ACTIVEX:JCOMSOFT
HTTP:STC:ACTIVEX:ZUNE
HTTP:STC:ACTIVEX:ICQ-TOOLBAR
HTTP:STC:ACTIVEX:TOM-SAMYER-GET
HTTP:STC:ACTIVEX:OFFICE-VIEWER
HTTP:STC:ACTIVEX:EDRAW
HTTP:STC:ACTIVEX:MS-EDRAW
HTTP:STC:ACTIVEX:OURGAME
HTTP:STC:ACTIVEX:DIVIS-WEB-DVR
HTTP:STC:ACTIVEX:PPSTREAM-BOF
HTTP:STC:ACTIVEX:WEBEX-GPC-DOS
HTTP:STC:ACTIVEX:VLC-PLY-RCE
HTTP:STC:ACTIVEX:ULTRAOFFICE
HTTP:STC:ACTIVEX:CITRIX-GATEWAY
HTTP:STC:ACTIVEX:EDRAW-PDF
HTTP:STC:ACTIVEX:NETSPRINTTBAR
HTTP:STC:ACTIVEX:HPIS-DATA-MGR
HTTP:STC:ACTIVEX:YAHOO-CYFT
HTTP:STC:ACTIVEX:FLASH-PLY-NULL
HTTP:STC:ACTIVEX:OWC
HTTP:STC:ACTIVEX:CYME-POWER-ENG
HTTP:STC:ACTIVEX:AOL-AMPX
HTTP:STC:ACTIVEX:NOVELL-RCE
HTTP:STC:ACTIVEX:HPQUTIL
HTTP:STC:ACTIVEX:WIBUKEY-RT-BO
HTTP:STC:ACTIVEX:HONEYWELL-EBI
HTTP:STC:ACTIVEX:BT-WEBHELPER
HTTP:STC:ACTIVEX:SONY-PCOMP-BOF
HTTP:STC:ACTIVEX:MCAFEE-VT
HTTP:STC:ACTIVEX:ZENWORKS
HTTP:STC:ACTIVEX:JAVA-DTK
HTTP:STC:ACTIVEX:ISSYMBOL
HTTP:STC:ACTIVEX:HONEYWELL-TEMA
HTTP:STC:ACTIVEX:SAMSNG-KIES
HTTP:STC:ACTIVEX:QTPLUGINX
HTTP:STC:ACTIVEX:MAGNETOSOFT
HTTP:STC:ACTIVEX:MAGNETOSOFT-OF
HTTP:STC:ACTIVEX:SIEMENS-WINCC
HTTP:STC:ACTIVEX:LIQUIDXML-MULT
HTTP:STC:ACTIVEX:MITSUBISHI-V3
HTTP:STC:ACTIVEX:KASP-AX
HTTP:STC:ACTIVEX:IBM-SPSS
HTTP:STC:ACTIVEX:NATIONAL-INST
HTTP:STC:ACTIVEX:IBM-ACCESS
HTTP:STC:ACTIVEX:VISBASIC6-AX-1
HTTP:STC:ACTIVEX:LIVE-PROFILE
HTTP:STC:ACTIVEX:MSMASK32-OCX
HTTP:STC:ACTIVEX:IENIPP
HTTP:STC:ACTIVEX:ISUSWEB
HTTP:STC:ACTIVEX:ORA-AUTOVUE
HTTP:STC:ACTIVEX:MS-MDAC
HTTP:STC:ACTIVEX:WMP-SCRIPT
HTTP:STC:ACTIVEX:SUN-JAVA-BO
HTTP:STC:ACTIVEX:ICONICS-WEBHMI
HTTP:STC:ACTIVEX:SNAPVIEW-RCE
HTTP:STC:ACTIVEX:MSGSC-DLL
HTTP:STC:ACTIVEX:WHALE-CLNT-BO
HTTP:STC:ACTIVEX:ORBIT-DWNLDR
HTTP:STC:ACTIVEX:SPEECH-API
HTTP:STC:ACTIVEX:ADODB
HTTP:STC:ACTIVEX:SYNACTISPDF-BO
HTTP:STC:ACTIVEX:AXIS-MEDIA-BO
HTTP:STC:ACTIVEX:BROADWIN
HTTP:STC:ACTIVEX:KAZAA-ALTNET
HTTP:STC:ACTIVEX:MS-AGENT-LIB
HTTP:STC:ACTIVEX:MAGNETO-ICMP
HTTP:STC:ACTIVEX:NOVELL-GRPWISE
HTTP:STC:ACTIVEX:EBCRYPT-PRNG
HTTP:STC:ACTIVEX:MAGNETOSOFT-OV
HTTP:STC:ACTIVEX:DOC-CAPTURE-BO
HTTP:STC:ACTIVEX:VMWARE-FS
HTTP:STC:ACTIVEX:DATA-ACTIVEBAR
HTTP:STC:ACTIVEX:CISCO-WVC200
HTTP:STC:ACTIVEX:IBM-TIVOLI
HTTP:STC:ACTIVEX:FLEXERA-ISGRID
HTTP:STC:ACTIVEX:ORACLE-SSSPLT
HTTP:STC:ACTIVEX:IBM-SPSS-MRAB
HTTP:STC:ACTIVEX:DOM-INOTES-WEB
HTTP:STC:ACTIVEX:NORTON-SYMSPAM
HTTP:STC:ACTIVEX:WIN2K-AX
HTTP:STC:ACTIVEX:JBOX
HTTP:STC:ACTIVEX:MW6-AZTEC-BO
HTTP:STC:ACTIVEX:WELLINTECH
HTTP:STC:ACTIVEX:MSXML-INFODISC
HTTP:STC:ACTIVEX:IPSWITCH-IMAIL
HTTP:STC:ACTIVEX:IBM-C1SIZER
HTTP:STC:ACTIVEX:WFILESTRING
HTTP:STC:ACTIVEX:XMLHTTP
HTTP:STC:ACTIVEX:XML-CORE-3-0
HTTP:STC:ACTIVEX:SHELL-APP
HTTP:STC:ACTIVEX:DATA-ANALYSIS
HTTP:STC:ACTIVEX:IE-DA
HTTP:STC:ACTIVEX:IEMOUSE-IMGTAG
HTTP:STC:ACTIVEX:DIVX-DOS
HTTP:STC:ACTIVEX:CAPICOM
HTTP:STC:ACTIVEX:COM-OBJ
HTTP:STC:ACTIVEX:HXVZ
HTTP:STC:ACTIVEX:CODEBASE
HTTP:STC:ACTIVEX:ACCESS-CORRUPT
HTTP:STC:ACTIVEX:DEV-TOOL
HTTP:STC:ACTIVEX:IE-TMP-FOLDER
HTTP:STC:ACTIVEX:MS-IE-COM-RCE
HTTP:STC:ACTIVEX:MS-DEBUGDIAG
HTTP:STC:ACTIVEX:NSKEY-DLL
HTTP:STC:ACTIVEX:RICHTXT
HTTP:STC:ACTIVEX:TROUBLE-QUERY
HTTP:STC:ACTIVEX:OLEAUTO32
HTTP:STC:ACTIVEX:IETAB-AX
HTTP:STC:ACTIVEX:NMSA-OF
HTTP:STC:ACTIVEX:MS-OWC-RCE
HTTP:STC:ACTIVEX:NDFXARTEFFECTS
HTTP:STC:ACTIVEX:VFP6R
HTTP:STC:ACTIVEX:VULN-DHTML
HTTP:STC:ACTIVEX:MS-WIN-MSGR
HTTP:STC:ACTIVEX:MS-OWC
HTTP:STC:ACTIVEX:MSCOMCTL-OCX
HTTP:STC:ACTIVEX:MSVIDCTL-1
HTTP:STC:ACTIVEX:ORCLE-WEBCENTR
HTTP:STC:ACTIVEX:EASYMAIL-LEAK
HTTP:STC:ACTIVEX:IE-POPUP
HTTP:STC:ACTIVEX:MS-IE-WMS
HTTP:STC:ACTIVEX:IE-ECENTREX
HTTP:STC:ACTIVEX:WORD-VIEWER
HTTP:STC:ACTIVEX:IE-CCRP
HTTP:STC:ACTIVEX:VS05-INJ

HTTP:STC:ADOBE

HTTP:STC:ADOBE:SWF-UNC-JUMP
HTTP:STC:ADOBE:PDF-DESC-FONTS
HTTP:STC:ADOBE:PDF-UUEXEC
HTTP:STC:ADOBE:PDF-CATALOG
HTTP:STC:ADOBE:SWF-FLASH-OF
HTTP:STC:ADOBE:FLASH-ARGREST
HTTP:STC:ADOBE:PDF-LIBTIFF
HTTP:STC:ADOBE:PDF-LAUNCH-CMD
HTTP:STC:ADOBE:PHOTOSHOP-ASSET
HTTP:STC:ADOBE:FLASH-DEFINE-TAG
HTTP:STC:ADOBE:FLASH-DYN-SCRIPT
HTTP:STC:ADOBE:FLASH-FLV-MEM
HTTP:STC:ADOBE:FLASH-AS-MEM-DOS
HTTP:STC:ADOBE:SWF-BUTTON
HTTP:STC:ADOBE:PDF-HEAP-RCE
HTTP:STC:ADOBE:FLASH-NULL-PTR
HTTP:STC:ADOBE:MAL-BMP
HTTP:STC:ADOBE:CVE-2013-5325-CE
HTTP:STC:ADOBE:CVE-2013-3355-CE
HTTP:STC:ADOBE:PDF-COMPACT
HTTP:STC:ADOBE:SHOCKWAVE-OOB
HTTP:STC:ADOBE:JS-CE
HTTP:STC:ADOBE:PDF-PICT-HEAP-OF
HTTP:STC:ADOBE:FLASH-FIREFOX
HTTP:STC:ADOBE:READER-NULL-PTR
HTTP:STC:ADOBE:DLMGR-AOM-OF
HTTP:STC:ADOBE:PDF-GOTO-XSS
HTTP:STC:ADOBE:PDF-ICC-PRODESC
HTTP:STC:ADOBE:READER-10.1.4-MC
HTTP:STC:ADOBE:PDF-JBIG2DECODE
HTTP:STC:ADOBE:PDF-OPENACTION
HTTP:STC:ADOBE:PDF-MAL-JPEG
HTTP:STC:ADOBE:PDF-JAVASCRIPT
HTTP:STC:ADOBE:PDF-OBFUSCATION
HTTP:STC:ADOBE:PDF-JS-METHOD
HTTP:STC:ADOBE:PDF-TJ-OBJECT
HTTP:STC:ADOBE:PDF-CLUT
HTTP:STC:ADOBE:CVE-2014-0493-CE
HTTP:STC:ADOBE:FLASH-INT-DOS
HTTP:STC:ADOBE:PDF-FLATEDECODE
HTTP:STC:ADOBE:READER-FONT-OF
HTTP:STC:ADOBE:PDF-COOLTYPE-BO
HTTP:STC:ADOBE:PDF-U3D-BO
HTTP:STC:ADOBE:EMBED-OBJ-MIME
HTTP:STC:ADOBE:TOOLBUTTON-UAF
HTTP:STC:ADOBE:JBIG2-SYMBOL-RCE
HTTP:STC:ADOBE:SWF-MAL-FILE
HTTP:STC:ADOBE:PDF-GETANNOTS
HTTP:STC:ADOBE:READER-HEAP-OVF
HTTP:STC:ADOBE:FLASHPLYR-HEAPOF
HTTP:STC:ADOBE:READER-CID-FONT
HTTP:STC:ADOBE:XFIR-LNAM
HTTP:STC:ADOBE:FLASH-INVOP
HTTP:STC:ADOBE:XFIR-RECORD
HTTP:STC:ADOBE:PDF-PRINTSEPS
HTTP:STC:ADOBE:PDF-URI-OACTION
HTTP:STC:ADOBE:PDF-UNICODED-SC
HTTP:STC:ADOBE:FLASH-INT-OVF
HTTP:STC:ADOBE:READER-FILE-DOS
HTTP:STC:ADOBE:READER-FILE-RCE
HTTP:STC:ADOBE:CVE-2013-3354-CE
HTTP:STC:ADOBE:PDF-XML-XSS
HTTP:STC:ADOBE:PDF-FONT
HTTP:STC:ADOBE:CS-NULL-POINTER
HTTP:STC:ADOBE:PDF-DRAWIMG
HTTP:STC:ADOBE:PDF-PRINTSEPS-2
HTTP:STC:ADOBE:SWF-ACTIONSET
HTTP:STC:ADOBE:PDF-FREETYPE
HTTP:STC:ADOBE:ACROFORM-MEM
HTTP:STC:ADOBE:PDF-JS-NEWPLAYER
HTTP:STC:ADOBE:CVE-2013-5331-CE
HTTP:STC:ADOBE:READER-IT
HTTP:STC:ADOBE:READER-BMP
HTTP:STC:ADOBE:XFIR-PAMI
HTTP:STC:ADOBE:XFIR-PAMM-MEM
HTTP:STC:ADOBE:CFF-OF
HTTP:STC:ADOBE:PDF-GLYPH-OF
HTTP:STC:ADOBE:PDF-CIDFONT
HTTP:STC:ADOBE:PDF-FIELDDIR
HTTP:STC:ADOBE:TRUETYPE-OF
HTTP:STC:ADOBE:FLASH-RUNTIME
HTTP:STC:ADOBE:PDF-UNI-3D
HTTP:STC:ADOBE:READER-DCT
HTTP:STC:ADOBE:READER-BMP-COLOR
HTTP:STC:ADOBE:SWF-ACTIONIF-DO
HTTP:STC:ADOBE:FLASH-BITMAPDATA
HTTP:STC:ADOBE:FLASH-SEQUENCE
HTTP:STC:ADOBE:FLASH-BMD-SCROLL
HTTP:STC:ADOBE:RMAS-RCE
HTTP:STC:ADOBE:SWF-IN-PDF
HTTP:STC:ADOBE:FLASH-ACTIONIF
HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC
HTTP:STC:ADOBE:TEXT-NETCONNECT
HTTP:STC:ADOBE:READER-WIDGET
HTTP:STC:ADOBE:SWF-DEFINEFUNC2
HTTP:STC:ADOBE:ACROBAT-U3D-RCE
HTTP:STC:ADOBE:SWF-INVALID-OBF
HTTP:STC:ADOBE:ACROBAT-U3D-BO
HTTP:STC:ADOBE:SWF-JPG-OF
HTTP:STC:ADOBE:SWF-GRADIENTFILL
HTTP:STC:ADOBE:READER-XSLT-BO
HTTP:STC:ADOBE:U3D-TEXTURE-BOF
HTTP:STC:ADOBE:READER-PICT-RLE
HTTP:STC:ADOBE:SWF-MAL-AS-OF
HTTP:STC:ADOBE:SWF-FLASH-BOF
HTTP:STC:ADOBE:SWF-MAL-AS-RCE
HTTP:STC:ADOBE:SWF-MAL-AS
HTTP:STC:ADOBE:ACROBAT-PICT-IMG
HTTP:STC:ADOBE:ACROBAT-BMP-HEAD
HTTP:STC:ADOBE:ACROBAT-JS-XRF
HTTP:STC:ADOBE:ACROBAT-IFF-OF
HTTP:STC:ADOBE:READER-BPROTECT
HTTP:STC:ADOBE:PDF-GDI-OBJ-RCE
HTTP:STC:ADOBE:ACROBAT-PCX-OF
HTTP:STC:ADOBE:ACROBAT-GLYPH-MC
HTTP:STC:ADOBE:PDF-JS-FILE
HTTP:STC:ADOBE:FLASH-XDOMAIN
HTTP:STC:ADOBE:PDF-COOLTYPE-RCE
HTTP:STC:ADOBE:READER-DOTRANGE
HTTP:STC:ADOBE:PDF-JPEG-FILE-CE
HTTP:STC:ADOBE:MAL-PSD
HTTP:STC:ADOBE:SWF-DEFINEFONT4
HTTP:STC:ADOBE:PDF-JPXDECODE
HTTP:STC:ADOBE:SWF-GRADIENTFIL2
HTTP:STC:ADOBE:SWF-APPLY-FUNC
HTTP:STC:ADOBE:U3D-CLODMESH-MC
HTTP:STC:ADOBE:FLASH-FILEREF-BO
HTTP:STC:ADOBE:FLASH-XSRF
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT
HTTP:STC:ADOBE:READER-U3D
HTTP:STC:ADOBE:SWF-POINTOBJ
HTTP:STC:ADOBE:CVE-2013-5329-CE
HTTP:STC:ADOBE:POSTSCRIPT-RCE
HTTP:STC:ADOBE:READER-PRC
HTTP:STC:ADOBE:PDF-SPELL-MC
HTTP:STC:ADOBE:TRUETYPE-FONT-CE
HTTP:STC:ADOBE:SWF-NEWFUNC
HTTP:STC:ADOBE:FLASH-SETSLOT
HTTP:STC:ADOBE:XFIR-KEY
HTTP:STC:ADOBE:SWF-METHOD-BODY
HTTP:STC:ADOBE:SHOCKWAVE-RCSL
HTTP:STC:ADOBE:SWF-XSFORGE
HTTP:STC:ADOBE:SWF-OPENTYPE-CFF
HTTP:STC:ADOBE:ACROBAT-XSS
HTTP:STC:ADOBE:SWF-SETTARGET
HTTP:STC:ADOBE:PDF-JS-HIDE
HTTP:STC:ADOBE:SWF-SEC-BYPASS
HTTP:STC:ADOBE:PS-TIFF-BOF
HTTP:STC:ADOBE:SWF-UNVRSL-XSS
HTTP:STC:ADOBE:SWF-XLS-MALF
HTTP:STC:ADOBE:PDF-EVASIVE-FF
HTTP:STC:ADOBE:SWF-TYPE-CONFUS
HTTP:STC:ADOBE:READER-HYBRID-BY
HTTP:STC:ADOBE:CVE-2013-0622-SB
HTTP:STC:ADOBE:FLASH-PLAYER-MP4
HTTP:STC:ADOBE:FLASH-MP4-NULL
HTTP:STC:ADOBE:FLASH-STAGE3D
HTTP:STC:ADOBE:FLASH-ACTIVEX-MC
HTTP:STC:ADOBE:FLS-PLYR-SWF-DOS
HTTP:STC:ADOBE:INDESIGN-INDD-BO
HTTP:STC:ADOBE:PUSHSTRING-RCE
HTTP:STC:ADOBE:FLASH-PLY-RCE
HTTP:STC:ADOBE:REDR-ACROFORM-MC
HTTP:STC:ADOBE:FLASH-OOB-MC
HTTP:STC:ADOBE:READER-INFO-DISC
HTTP:STC:ADOBE:READER-PLUGIN
HTTP:STC:ADOBE:FLEX3-HISTORY
HTTP:STC:ADOBE:READER-REMTE-DOS
HTTP:STC:ADOBE:COLDFUSION-NAME
HTTP:STC:ADOBE:FLASH-INT-OV
HTTP:STC:ADOBE:FLASH-BO
HTTP:STC:ADOBE:FLASH-MC
HTTP:STC:ADOBE:ACROBAT-URL-DF
HTTP:STC:ADOBE:FLASH-CSS-EXP
HTTP:STC:ADOBE:READER-INT-OF
HTTP:STC:ADOBE:READER-TTF-DESC
HTTP:STC:ADOBE:PS-PNG-BO
HTTP:STC:ADOBE:FLSHPLYR-INFDISC
HTTP:STC:ADOBE:AUD-SESSFILE
HTTP:STC:ADOBE:SWF-REMOTE-MC
HTTP:STC:ADOBE:BMP-HEADER
HTTP:STC:ADOBE:DEFINEFONT
HTTP:STC:ADOBE:SWF-UAF-JS
HTTP:STC:ADOBE:CLTYP-TYPGPY-DOS
HTTP:STC:ADOBE:REVOKED-CERT
HTTP:STC:ADOBE:READER-WKT-BO
HTTP:STC:ADOBE:JPEG-FILE-OF
HTTP:STC:ADOBE:PDF-UTILPRINTF
HTTP:STC:ADOBE:SWF-FILE-XSS
HTTP:STC:ADOBE:READER-JP2K-BO
HTTP:STC:ADOBE:TTF-HANDLING
HTTP:STC:ADOBE:READER-MC-RCE
HTTP:STC:ADOBE:READER-OOB-WRITE
HTTP:STC:ADOBE:READER-STACK-EXH
HTTP:STC:ADOBE:FLASH-AS2-OF
HTTP:STC:ADOBE:FLASH-ARGCOUNT
HTTP:STC:ADOBE:CAM-RAW-PLUGIN
HTTP:STC:ADOBE:READER-PDF-DOS
HTTP:STC:ADOBE:FLASH-MEDIA-SRVR
HTTP:STC:ADOBE:FLASH-DYN-CALC
HTTP:STC:ADOBE:FLATEDECODE-BO
HTTP:STC:ADOBE:FLASH-SNATIVE
HTTP:STC:ADOBE:FLASH-MP4LOAD-BO
HTTP:STC:ADOBE:PDF-UAC-HANDLE
HTTP:STC:ADOBE:SWF-MEM-COR
HTTP:STC:ADOBE:PDF-EBUK-FORMSTR
HTTP:STC:ADOBE:PDF-EXT-OF
HTTP:STC:ADOBE:SWF-LINUX-AS
HTTP:STC:ADOBE:WEIGHTVECTOR
HTTP:STC:ADOBE:PDF-U3D-CLOD
HTTP:STC:ADOBE:PDF-BITDEF-OF
HTTP:STC:ADOBE:XFIR-RCSL
HTTP:STC:ADOBE:TSAC-STRING
HTTP:STC:ADOBE:PDF-3D-WH
HTTP:STC:ADOBE:XFIR-PAMI-RCE
HTTP:STC:ADOBE:FLASH-AS3-INT-OV
HTTP:STC:ADOBE:PDF-UNIVERSAL3D
HTTP:STC:ADOBE:MAL-IFF
HTTP:STC:ADOBE:PDF-EMBEDDEDFILE
HTTP:STC:ADOBE:SWF-MEM-CORR
HTTP:STC:ADOBE:FLASHPLR-FILE-MC
HTTP:STC:ADOBE:CVE-2013-3352-CE
HTTP:STC:ADOBE:FLASHPLR-NULL-MC
HTTP:STC:ADOBE:2013-5065-PDF
HTTP:STC:ADOBE:PDF-UAF-RCE
HTTP:STC:ADOBE:CVE-2013-5330-MC
HTTP:STC:ADOBE:PDF-ICC-RCE
HTTP:STC:ADOBE:LIBTIF-FETCHDATA
HTTP:STC:ADOBE:FLASH-INFO-DISC
HTTP:STC:ADOBE:CVE-2013-5332-CE
HTTP:STC:ADOBE:CVE-2014-0499-MC
HTTP:STC:ADOBE:READER-ICC-RCE
HTTP:STC:ADOBE:READER-MAL-PDF
HTTP:STC:ADOBE:CVE-2014-0497-MC
HTTP:STC:ADOBE:CVE-2013-3357-MC
HTTP:STC:ADOBE:FLASH-MAL-ACTION
HTTP:STC:ADOBE:CVE-2013-5324-MC
HTTP:STC:ADOBE:BMP-INT-OVF
HTTP:STC:ADOBE:PPT-EXTTIMENODE
HTTP:STC:ADOBE:SWF-EVENTLISTEN
HTTP:STC:ADOBE:XFIR-TSAC
HTTP:STC:ADOBE:SWF-INFO-DISC
HTTP:STC:ADOBE:PM-FONT-OF
HTTP:STC:ADOBE:FLASH-OP
HTTP:STC:ADOBE:PDF-CCITT
HTTP:STC:ADOBE:PDF-COLORS-INT
HTTP:STC:ADOBE:FLASH-PLAYER-BOF
HTTP:STC:ADOBE:PS-CS4-MULTI-BO
HTTP:STC:ADOBE:AUD-TRKM
HTTP:STC:ADOBE:ACROBAT-JPEG2000
HTTP:STC:ADOBE:FLASH-NULL-DOS
HTTP:STC:ADOBE:CVE-2013-3353
HTTP:STC:ADOBE:ACROBAT-GETICON
HTTP:STC:ADOBE:FLASH-PLAYER-AIR
HTTP:STC:ADOBE:FLV-APPENDBYTES
HTTP:STC:ADOBE:FLASH-PLAYER-XSS
HTTP:STC:ADOBE:FLASH-INFODISC
HTTP:STC:ADOBE:FLASH-PLAYER-BO
HTTP:STC:ADOBE:CVE-2014-0506-UF

HTTP:STC:ATL

HTTP:STC:ATL:OWC
HTTP:STC:ATL:CISCO-UNITY
HTTP:STC:ATL:SHOCKWAVE
HTTP:STC:ATL:MSOFFICE-AX
HTTP:STC:ATL:DIRECTSHOW

HTTP:STC:BT

HTTP:STC:BT:FDM-TORRENT-BOF

HTTP:STC:CHROME

HTTP:STC:CHROME:GURL-XO-BYPASS
HTTP:STC:CHROME:PEPPER-PLGN-UAF
HTTP:STC:CHROME:NOTIFY-IWD-UAF
HTTP:STC:CHROME:BUG-REPORT-CE
HTTP:STC:CHROME:STALE-PTR
HTTP:STC:CHROME:ID-ATTR-OBJ-UAF
HTTP:STC:CHROME:DOM-UAF
HTTP:STC:CHROME:WEBKIT-OO
HTTP:STC:CHROME:MUL-FILE-TYPE
HTTP:STC:CHROME:MUTATIONOBS-UAF
HTTP:STC:CHROME:RESPONSE-MC
HTTP:STC:CHROME:EXECCMD-UAF
HTTP:STC:CHROME:LIST-INSIDE-COL
HTTP:STC:CHROME:VIEW-SOURCE-DOS
HTTP:STC:CHROME:FILE-DOWNLOAD
HTTP:STC:CHROME:URL-ELIDER.BOF
HTTP:STC:CHROME:IFRAME-INFO-DIS
HTTP:STC:CHROME:POPUP-URI-SPOOF
HTTP:STC:CHROME:ARRAY-INTOVF
HTTP:STC:CHROME:V8-JS-OOB
HTTP:STC:CHROME:SVG-DSTRCTR-UAF
HTTP:STC:CHROME:CLPBRD-DATA-MC
HTTP:STC:CHROME:OBJ-BFRLOAD-UAF
HTTP:STC:CHROME:TABLE-CSS-MC
HTTP:STC:CHROME:IFRAME-VIDEO-MC
HTTP:STC:CHROME:RANGE-BLUR-MC
HTTP:STC:CHROME:V8-ARRAY-OOB
HTTP:STC:CHROME:TEMPLTE-DOM-UAF

HTTP:STC:CLSID:ACTIVEX

HTTP:STC:CLSID:ACTIVEX:SYM-FWAX
HTTP:STC:CLSID:ACTIVEX:DLMGR
HTTP:STC:CLSID:ACTIVEX:ORADC
HTTP:STC:CLSID:ACTIVEX:LEN-AX
HTTP:STC:CLSID:ACTIVEX:PAVPZ
HTTP:STC:CLSID:ACTIVEX:ORADC2
HTTP:STC:CLSID:ACTIVEX:SWCTL
HTTP:STC:CLSID:ACTIVEX:NESSCAN
HTTP:STC:CLSID:ACTIVEX:INTUIT
HTTP:STC:CLSID:ACTIVEX:AOL-AX
HTTP:STC:CLSID:ACTIVEX:MDSAUTH
HTTP:STC:CLSID:ACTIVEX:MACRO-AX
HTTP:STC:CLSID:ACTIVEX:AX-35
HTTP:STC:CLSID:ACTIVEX:AX-38
HTTP:STC:CLSID:ACTIVEX:AX-36
HTTP:STC:CLSID:ACTIVEX:AX-40
HTTP:STC:CLSID:ACTIVEX:AX-39
HTTP:STC:CLSID:ACTIVEX:AX-37
HTTP:STC:CLSID:ACTIVEX:AX-33
HTTP:STC:CLSID:ACTIVEX:AX-20
HTTP:STC:CLSID:ACTIVEX:AX-34
HTTP:STC:CLSID:ACTIVEX:AX-32
HTTP:STC:CLSID:ACTIVEX:AX-11
HTTP:STC:CLSID:ACTIVEX:AX-62
HTTP:STC:CLSID:ACTIVEX:AX-67
HTTP:STC:CLSID:ACTIVEX:AX-66
HTTP:STC:CLSID:ACTIVEX:AX-61
HTTP:STC:CLSID:ACTIVEX:AX-64
HTTP:STC:CLSID:ACTIVEX:AX-65
HTTP:STC:CLSID:ACTIVEX:AX-59
HTTP:STC:CLSID:ACTIVEX:AX-57
HTTP:STC:CLSID:ACTIVEX:AX-21
HTTP:STC:CLSID:ACTIVEX:AX-18
HTTP:STC:CLSID:ACTIVEX:AX-27
HTTP:STC:CLSID:ACTIVEX:AX-28
HTTP:STC:CLSID:ACTIVEX:AX-25
HTTP:STC:CLSID:ACTIVEX:AX-17
HTTP:STC:CLSID:ACTIVEX:AX-24
HTTP:STC:CLSID:ACTIVEX:AX-22
HTTP:STC:CLSID:ACTIVEX:AX-26
HTTP:STC:CLSID:ACTIVEX:AX-14
HTTP:STC:CLSID:ACTIVEX:AX-16
HTTP:STC:CLSID:ACTIVEX:AX-15
HTTP:STC:CLSID:ACTIVEX:AX-13
HTTP:STC:CLSID:ACTIVEX:AX-12
HTTP:STC:CLSID:ACTIVEX:AX-72
HTTP:STC:CLSID:ACTIVEX:AX-75
HTTP:STC:CLSID:ACTIVEX:AX-71
HTTP:STC:CLSID:ACTIVEX:AX-69
HTTP:STC:CLSID:ACTIVEX:AX-74
HTTP:STC:CLSID:ACTIVEX:AX-70
HTTP:STC:CLSID:ACTIVEX:AX-73
HTTP:STC:CLSID:ACTIVEX:AX-68
HTTP:STC:CLSID:ACTIVEX:AX-98
HTTP:STC:CLSID:ACTIVEX:AX-51
HTTP:STC:CLSID:ACTIVEX:AX-56
HTTP:STC:CLSID:ACTIVEX:AX-60
HTTP:STC:CLSID:ACTIVEX:AX-52
HTTP:STC:CLSID:ACTIVEX:AX-53
HTTP:STC:CLSID:ACTIVEX:AX-55
HTTP:STC:CLSID:ACTIVEX:AX-50
HTTP:STC:CLSID:ACTIVEX:AX-47
HTTP:STC:CLSID:ACTIVEX:AX-49
HTTP:STC:CLSID:ACTIVEX:AX-42
HTTP:STC:CLSID:ACTIVEX:AX-46
HTTP:STC:CLSID:ACTIVEX:AX-48
HTTP:STC:CLSID:ACTIVEX:AX-43
HTTP:STC:CLSID:ACTIVEX:AX-54
HTTP:STC:CLSID:ACTIVEX:AX-83
HTTP:STC:CLSID:ACTIVEX:AX-94
HTTP:STC:CLSID:ACTIVEX:AX-104
HTTP:STC:CLSID:ACTIVEX:AX-102
HTTP:STC:CLSID:ACTIVEX:AX-105
HTTP:STC:CLSID:ACTIVEX:AX-103
HTTP:STC:CLSID:ACTIVEX:AX-97
HTTP:STC:CLSID:ACTIVEX:AX-101
HTTP:STC:CLSID:ACTIVEX:AX-77
HTTP:STC:CLSID:ACTIVEX:AX-79
HTTP:STC:CLSID:ACTIVEX:SONY-XCP
HTTP:STC:CLSID:ACTIVEX:AX-84
HTTP:STC:CLSID:ACTIVEX:AX-90
HTTP:STC:CLSID:ACTIVEX:AX-89
HTTP:STC:CLSID:ACTIVEX:AX-85
HTTP:STC:CLSID:ACTIVEX:AX-93
HTTP:STC:CLSID:ACTIVEX:AX-87
HTTP:STC:CLSID:ACTIVEX:AX-82
HTTP:STC:CLSID:ACTIVEX:AX-86
HTTP:STC:CLSID:ACTIVEX:AX-92
HTTP:STC:CLSID:ACTIVEX:AX-91
HTTP:STC:CLSID:ACTIVEX:AX-88
HTTP:STC:CLSID:ACTIVEX:BB-PURE
HTTP:STC:CLSID:ACTIVEX:AX-133
HTTP:STC:CLSID:ACTIVEX:AX-138
HTTP:STC:CLSID:ACTIVEX:AX-134
HTTP:STC:CLSID:ACTIVEX:AX-124
HTTP:STC:CLSID:ACTIVEX:AX-131
HTTP:STC:CLSID:ACTIVEX:AX-129
HTTP:STC:CLSID:ACTIVEX:AX-135
HTTP:STC:CLSID:ACTIVEX:AX-122
HTTP:STC:CLSID:ACTIVEX:AX-132
HTTP:STC:CLSID:ACTIVEX:AX-142
HTTP:STC:CLSID:ACTIVEX:AX-141
HTTP:STC:CLSID:ACTIVEX:AX-125
HTTP:STC:CLSID:ACTIVEX:AX-130
HTTP:STC:CLSID:ACTIVEX:AX-128
HTTP:STC:CLSID:ACTIVEX:AX-120
HTTP:STC:CLSID:ACTIVEX:AX-121
HTTP:STC:CLSID:ACTIVEX:AX-123
HTTP:STC:CLSID:ACTIVEX:AX-143
HTTP:STC:CLSID:ACTIVEX:AX-140
HTTP:STC:CLSID:ACTIVEX:AX-146
HTTP:STC:CLSID:ACTIVEX:AX-147
HTTP:STC:CLSID:ACTIVEX:AX-114
HTTP:STC:CLSID:ACTIVEX:AX-109
HTTP:STC:CLSID:ACTIVEX:AX-115
HTTP:STC:CLSID:ACTIVEX:AX-111
HTTP:STC:CLSID:ACTIVEX:AX-107
HTTP:STC:CLSID:ACTIVEX:AX-116
HTTP:STC:CLSID:ACTIVEX:AX-113
HTTP:STC:CLSID:ACTIVEX:AX-99
HTTP:STC:CLSID:ACTIVEX:AX-153
HTTP:STC:CLSID:ACTIVEX:AX-06
HTTP:STC:CLSID:ACTIVEX:AX-29
HTTP:STC:CLSID:ACTIVEX:AX-58
HTTP:STC:CLSID:ACTIVEX:AX-80
HTTP:STC:CLSID:ACTIVEX:AX-81
HTTP:STC:CLSID:ACTIVEX:AX-01
HTTP:STC:CLSID:ACTIVEX:AX-126
HTTP:STC:CLSID:ACTIVEX:NCT-AX
HTTP:STC:CLSID:ACTIVEX:AX-119
HTTP:STC:CLSID:ACTIVEX:AX-78
HTTP:STC:CLSID:ACTIVEX:YVERINFO
HTTP:STC:CLSID:ACTIVEX:MOTIVE
HTTP:STC:CLSID:ACTIVEX:MAGVIEW
HTTP:STC:CLSID:ACTIVEX:LENOVO
HTTP:STC:CLSID:ACTIVEX:RFCGUI
HTTP:STC:CLSID:ACTIVEX:HP-AX
HTTP:STC:CLSID:ACTIVEX:SHELLAPP
HTTP:STC:CLSID:ACTIVEX:HTML-HP2
HTTP:STC:CLSID:ACTIVEX:SYM-SS
HTTP:STC:CLSID:ACTIVEX:VERI-AX
HTTP:STC:CLSID:ACTIVEX:EPO-SM
HTTP:STC:CLSID:ACTIVEX:NAVOPTS
HTTP:STC:CLSID:ACTIVEX:INC-AX
HTTP:STC:CLSID:ACTIVEX:DXSDK
HTTP:STC:CLSID:ACTIVEX:FPOLE
HTTP:STC:CLSID:ACTIVEX:VANTAGEX
HTTP:STC:CLSID:ACTIVEX:XMLCORE
HTTP:STC:CLSID:ACTIVEX:DXTLIPI
HTTP:STC:CLSID:ACTIVEX:HP-MODEM
HTTP:STC:CLSID:ACTIVEX:ACER-OBJ
HTTP:STC:CLSID:ACTIVEX:AX-23
HTTP:STC:CLSID:ACTIVEX:AX-30
HTTP:STC:CLSID:ACTIVEX:AX-145
HTTP:STC:CLSID:ACTIVEX:AX-63
HTTP:STC:CLSID:ACTIVEX:AX-149
HTTP:STC:CLSID:ACTIVEX:YAHOO-IM
HTTP:STC:CLSID:ACTIVEX:AX-137
HTTP:STC:CLSID:ACTIVEX:AX-127
HTTP:STC:CLSID:ACTIVEX:AX-117
HTTP:STC:CLSID:ACTIVEX:AX-31
HTTP:STC:CLSID:ACTIVEX:AX-136
HTTP:STC:CLSID:ACTIVEX:CTX-ICA
HTTP:STC:CLSID:ACTIVEX:HRTBEAT
HTTP:STC:CLSID:ACTIVEX:AX-10
HTTP:STC:CLSID:ACTIVEX:SONICAX
HTTP:STC:CLSID:ACTIVEX:ACROPDF
HTTP:STC:CLSID:ACTIVEX:VMWARE
HTTP:STC:CLSID:ACTIVEX:OUACTR
HTTP:STC:CLSID:ACTIVEX:SAP-AX
HTTP:STC:CLSID:ACTIVEX:AX-112
HTTP:STC:CLSID:ACTIVEX:INOTES6W
HTTP:STC:CLSID:ACTIVEX:MCAFEE
HTTP:STC:CLSID:ACTIVEX:EXECHAND
HTTP:STC:CLSID:ACTIVEX:TREND-AX
HTTP:STC:CLSID:ACTIVEX:OSCAN8
HTTP:STC:CLSID:ACTIVEX:WH32-OF
HTTP:STC:CLSID:ACTIVEX:AX-07
HTTP:STC:CLSID:ACTIVEX:AX-09
HTTP:STC:CLSID:ACTIVEX:AX-05
HTTP:STC:CLSID:ACTIVEX:AX-02
HTTP:STC:CLSID:ACTIVEX:AX-08
HTTP:STC:CLSID:ACTIVEX:AX-100
HTTP:STC:CLSID:ACTIVEX:AX-118
HTTP:STC:CLSID:ACTIVEX:AX-108
HTTP:STC:CLSID:ACTIVEX:AX-44
HTTP:STC:CLSID:ACTIVEX:AX-151
HTTP:STC:CLSID:ACTIVEX:WSH
HTTP:STC:CLSID:ACTIVEX:AX-139
HTTP:STC:CLSID:ACTIVEX:AX-45
HTTP:STC:CLSID:ACTIVEX:AX-106
HTTP:STC:CLSID:ACTIVEX:VML-AX
HTTP:STC:CLSID:ACTIVEX:AX-76
HTTP:STC:CLSID:ACTIVEX:AX-19
HTTP:STC:CLSID:ACTIVEX:VBTOVSI
HTTP:STC:CLSID:ACTIVEX:AX-41
HTTP:STC:CLSID:ACTIVEX:HTML-HLP
HTTP:STC:CLSID:ACTIVEX:AX-144
HTTP:STC:CLSID:ACTIVEX:AX-110
HTTP:STC:CLSID:ACTIVEX:CREATEOB
HTTP:STC:CLSID:ACTIVEX:JINIT-AX

HTTP:STC:DL

HTTP:STC:DL:QT-UDTA-ATOM
HTTP:STC:DL:CLAMAV-UPX-FILE-MC
HTTP:STC:DL:MAL-VISIO
HTTP:STC:DL:WINRAR-FILE
HTTP:STC:DL:RADASM-MNU-BOF
HTTP:STC:DL:MOZILLA-WAV-BOF
HTTP:STC:DL:MS-PPT-2007-MC
HTTP:STC:DL:LOTUS-LZH-BOF
HTTP:STC:DL:MAL-WRI
HTTP:STC:DL:WORD-CLSID
HTTP:STC:DL:RADASM-RAD-BOF
HTTP:STC:DL:MAL-MPP
HTTP:STC:DL:AVI-LIST-OF
HTTP:STC:DL:VARICAD-DWB
HTTP:STC:DL:VIDEOLAN-VLC-SWF-CE
HTTP:STC:DL:VIDEOLAN-VLC-BOF
HTTP:STC:DL:MICROCHIP-MPLAB-BOF
HTTP:STC:DL:XNVIEW-PCT-FILE-BOF
HTTP:STC:DL:CYBERLINK-MUL-BO
HTTP:STC:DL:MAL-ASX-OF
HTTP:STC:DL:XLS-DATA-INIT
HTTP:STC:DL:HELP-IMG-HEAP
HTTP:STC:DL:MPG123-HEAP-OF
HTTP:STC:DL:NOVELL-SAV-DOS
HTTP:STC:DL:QUICKTIME-MOV-BOF
HTTP:STC:DL:WORD-STYLE-EXEC
HTTP:STC:DL:QT-FLIPFILETYPE
HTTP:STC:DL:WIN-MAL-COMP-FILE
HTTP:STC:DL:BREAKPOINT-HEX-BOF
HTTP:STC:DL:OSX-GIF-BANDPROC
HTTP:STC:DL:WORD-ARRAY-DATA
HTTP:STC:DL:QT-COLOR-TABLE
HTTP:STC:DL:MS-WIN-DOTNET-RCE
HTTP:STC:DL:WPS-HEAP-OF
HTTP:STC:DL:ACCUSOFT-IMGEAR-BO
HTTP:STC:DL:PDF-FILE
HTTP:STC:DL:BZIP2-FILE
HTTP:STC:DL:ZIP-FILE
HTTP:STC:DL:CYTEL-LGXACT-CYL-BO
HTTP:STC:DL:CYTEL-CRSOVR-CYB-BO
HTTP:STC:DL:AOL-DESKTOP-RTX-BOF
HTTP:STC:DL:MAL-MDB
HTTP:STC:DL:QT-JVTCOMPENCODE
HTTP:STC:DL:AVAST-LHA
HTTP:STC:DL:MAL-MPEG-4
HTTP:STC:DL:FOXIT-PDF-OF
HTTP:STC:DL:MAL-MOVIEMAKER
HTTP:STC:DL:WORD-FONT
HTTP:STC:DL:WORD-CMAJ
HTTP:STC:DL:GZIP-LHZ
HTTP:STC:DL:OTF-DOS
HTTP:STC:DL:VIDEOLAN-VLC-PNG-CE
HTTP:STC:DL:PDF-PRINTSEPS
HTTP:STC:DL:REAL-SWF-BOF
HTTP:STC:DL:APPLE-PLS-FILE-BOF
HTTP:STC:DL:ACDSEE-FS-ID-PLP-BO
HTTP:STC:DL:ACE-BO
HTTP:STC:DL:PPT-FF-BOF
HTTP:STC:DL:QT-FPX-IO
HTTP:STC:DL:WORD-MEM-CORR
HTTP:STC:DL:RTF-LISTID-UAF
HTTP:STC:DL:AVISOFT-DTV-PLF-BO
HTTP:STC:DL:XBM-BO
HTTP:STC:DL:WORD-BOOKMARK-OF
HTTP:STC:DL:4XM-VULNS
HTTP:STC:DL:PANDA-ZOO-BO
HTTP:STC:DL:CLAMAV-INT
HTTP:STC:DL:OTF-FONT-INT
HTTP:STC:DL:INFORMIX-NFX
HTTP:STC:DL:WPD-BO
HTTP:STC:DL:WORD-RTF-RCE
HTTP:STC:DL:VIDEOLAN-WAV-IO
HTTP:STC:DL:WORD-MAL-INDEX
HTTP:STC:DL:XLS-FILE-HNDL
HTTP:STC:DL:OPENSSL-CMS-FILE
HTTP:STC:DL:OFFICE-CGM
HTTP:STC:DL:MSHTML-DBLFREE
HTTP:STC:DL:MPLAYER-TWINVQ-BO
HTTP:STC:DL:XLS-BIFF-REC-RCE
HTTP:STC:DL:XLS-MDXTUPLE-BIFF
HTTP:STC:DL:VLC-CUE-OF
HTTP:STC:DL:PPTVIEWER-DRAWSHAPE
HTTP:STC:DL:MAL-XRL
HTTP:STC:DL:ORBIT-DOWNLOADER-OF
HTTP:STC:DL:WORD-SPRMTSETBRC
HTTP:STC:DL:WORD-SPRMDEFTABLE
HTTP:STC:DL:XLS-MSOFBTOPT
HTTP:STC:DL:OTF-NULL-PTR
HTTP:STC:DL:MS-WIN-VERIFY-TRUST
HTTP:STC:DL:XLS-PUB-REC
HTTP:STC:DL:XLS-WORKSPACE-DES
HTTP:STC:DL:XLS-HFPICTURE-REC
HTTP:STC:DL:MPLAYER-DEMUXER
HTTP:STC:DL:OTF-INDEX-RCE
HTTP:STC:DL:VISIO-DXF-RCE
HTTP:STC:DL:MS-OFFICE-2007-MC
HTTP:STC:DL:CLAMAV-CHM-DOS
HTTP:STC:DL:XLS-COLUMN-RECORD
HTTP:STC:DL:XLS-DRAWING-REC
HTTP:STC:DL:XLS-MBOF
HTTP:STC:DL:SWF-ACTIONPUSH
HTTP:STC:DL:PDF-U3D-CLOD
HTTP:STC:DL:PAC-DESIGNER-BO
HTTP:STC:DL:WP5-FILE
HTTP:STC:DL:MULTIMEDIA-JUKEBOX
HTTP:STC:DL:XLS-SERIES-TYPE-RCE
HTTP:STC:DL:VLC-MEDIA-PLY-BO
HTTP:STC:DL:CCMPLAYER-M3U-OF
HTTP:STC:DL:MS-OFFICE-DOC-MC
HTTP:STC:DL:SWF-ACTIONCONSTPOOL
HTTP:STC:DL:XLS-VBOBJ-RCE
HTTP:STC:DL:MS-OFFICE-STRING
HTTP:STC:DL:LIBFLAC-VORBIS-CMT
HTTP:STC:DL:OO-XPMREAD-OF
HTTP:STC:DL:VLC-XSPF-MC
HTTP:STC:DL:MSPUBLISHER-OBJ
HTTP:STC:DL:MS-OFFICE-XL-MC
HTTP:STC:DL:RAINBOWPLY-BOF
HTTP:STC:DL:XLS-SERIES
HTTP:STC:DL:APPLE-ITUNES-IO
HTTP:STC:DL:MS-READER-MC
HTTP:STC:DL:OFF-GDI-RCD-TYPE
HTTP:STC:DL:MS-THEME-RCE
HTTP:STC:DL:WORD-LINK-OBJ
HTTP:STC:DL:WORD-RTF-CONTROL
HTTP:STC:DL:QT-STSD-ATOMS
HTTP:STC:DL:XL-CVE-2013-1315
HTTP:STC:DL:XLS-HEAP-OF
HTTP:STC:DL:WMF-IO
HTTP:STC:DL:VLC-MEDIAPLAYER-RCE
HTTP:STC:DL:XLS-WRITEAV
HTTP:STC:DL:XLS-CF-BIFF
HTTP:STC:DL:GNU-TAR-PAX-BOF
HTTP:STC:DL:AVI-MMAKER
HTTP:STC:DL:APPLE-QT-JPEG-OF
HTTP:STC:DL:RTF-MISMATCH
HTTP:STC:DL:SAWSTUDIO-PRF-BOF
HTTP:STC:DL:MS-OPEN-FONT-FILE
HTTP:STC:DL:XLS-SXLI-MC
HTTP:STC:DL:XLS-LBL-RECORD
HTTP:STC:DL:OFFICE-MSO
HTTP:STC:DL:XLS-MS-OGRAPH
HTTP:STC:DL:MS-EXCEL-OBJ-MC
HTTP:STC:DL:JAVA-FILEDIALOG-BOF
HTTP:STC:DL:DIRECTSHOW-QUICK-MC
HTTP:STC:DL:CYBERLINK-LIST-OF
HTTP:STC:DL:LOTUS-DOC-VIEWER
HTTP:STC:DL:VISIO-FREED
HTTP:STC:DL:XLS-MERGECELLS-OF
HTTP:STC:DL:FOXIT-PDF-FILE-DOS
HTTP:STC:DL:ALTOVA-DATABASE-BOF
HTTP:STC:DL:ACDSEE-XPM-COLOR
HTTP:STC:DL:ALADDIN-ETOKEN-RCE
HTTP:STC:DL:FREETYPE-TYPE1
HTTP:STC:DL:XLS-XISPARENT
HTTP:STC:DL:COM-CLSID-DLL
HTTP:STC:DL:MS-PUB-RCE
HTTP:STC:DL:XLS-SHRFMLA
HTTP:STC:DL:XLS-BOUNDSHEET
HTTP:STC:DL:MAL-RMF-GM
HTTP:STC:DL:XLS-SELECTION
HTTP:STC:DL:MPLAYER-CALLOC
HTTP:STC:DL:OTF-GLYPH
HTTP:STC:DL:ASF-DF
HTTP:STC:DL:VS-XML-INFO
HTTP:STC:DL:WMP-DVR-MS
HTTP:STC:DL:APPLE-QT-H264-OF
HTTP:STC:DL:XLS-OBJ-BIFF
HTTP:STC:DL:WORD-BOF
HTTP:STC:DL:OPENOFFICE-TIFF-OF
HTTP:STC:DL:MS-OFFICE-EXCEL-RCE
HTTP:STC:DL:SHOCKWAVE-3D-RCE
HTTP:STC:DL:OTF-INF-LOOP
HTTP:STC:DL:QT-PV-GIF
HTTP:STC:DL:PPT-OFFICEART
HTTP:STC:DL:APPLE-QT-VR-TRCK-OF
HTTP:STC:DL:PPT-FB1-ATOM-OF
HTTP:STC:DL:XLS-XF-BIFF
HTTP:STC:DL:TRUETYPE-PARSE2
HTTP:STC:DL:OO-EMF
HTTP:STC:DL:XLS-SCENARIO
HTTP:STC:DL:VISIO-UMLSTRING
HTTP:STC:DL:OTF-BO
HTTP:STC:DL:NOKIA-PLAYER-BOF
HTTP:STC:DL:MS-WORD-XST-BOF
HTTP:STC:DL:FOXIT-CREATEOBJ
HTTP:STC:DL:MS-PUBLISHER-RCE
HTTP:STC:DL:QT-STSC-ATOM-MC
HTTP:STC:DL:XLS-MAL-REC-MC
HTTP:STC:DL:XLS-MAL-OBJ
HTTP:STC:DL:MS-WORD-MEM-CORR
HTTP:STC:DL:WINAMP-MAL-PLS
HTTP:STC:DL:VISIO-INVALID-ROW
HTTP:STC:DL:VISIO-OBJ-CONFUSION
HTTP:STC:DL:XLS-WINDOW2
HTTP:STC:DL:PUB-INDEXLIMITS
HTTP:STC:DL:XLS-FORMULA-BIFF
HTTP:STC:DL:PPT-LEGACY-FMT-OF
HTTP:STC:DL:QT-FLASHPIX-BOF
HTTP:STC:DL:FAT-MEDIAPLAYER-RCE
HTTP:STC:DL:MP3-WM-MEM
HTTP:STC:DL:MS-VISIO-DXF-BO
HTTP:STC:DL:SOPHOS-ZIPDOS
HTTP:STC:DL:XLS-SST-REC-MC
HTTP:STC:DL:WEBEX-RECORD-ATAS
HTTP:STC:DL:VLC-M3U-FTP
HTTP:STC:DL:MAL-PLS
HTTP:STC:DL:OTF-FONT-SIZE
HTTP:STC:DL:PPT-2000-BOF
HTTP:STC:DL:ULTRAISO-CUE
HTTP:STC:DL:IDEAL-SERVER-OF
HTTP:STC:DL:XLS-IMDATA
HTTP:STC:DL:MSVB-DSR-BOF
HTTP:STC:DL:APPLE-QT-IMAGE-MC
HTTP:STC:DL:DOT-NET-WEB-PROXY
HTTP:STC:DL:ESET-SMART-SECURITY
HTTP:STC:DL:VISUAL-INTERDEV
HTTP:STC:DL:OPENOFFICE-CSV-DOS
HTTP:STC:DL:GHOSTSCRIPT-PS-BOF
HTTP:STC:DL:LCPLAYER-BOF
HTTP:STC:DL:REAL-3GP-FILE-MC
HTTP:STC:DL:KINGSOFT-IS-DOS
HTTP:STC:DL:SODA-PDF-DOS
HTTP:STC:DL:ORBITAL-VIEWER-ORB
HTTP:STC:DL:MS-PUB-MC
HTTP:STC:DL:SNACKAMP-SMP-BOF
HTTP:STC:DL:GENSTAT-GSH-OF
HTTP:STC:DL:AVI-DL-MEM
HTTP:STC:DL:VISIO-MAL-DXF
HTTP:STC:DL:MS-FON-FILE-RCE
HTTP:STC:DL:FEEDDEMON-OPML-BOF
HTTP:STC:DL:NIEW-EWB-BOF
HTTP:STC:DL:MS-PAINT-BMP-MC
HTTP:STC:DL:PCSOFT-WDP-FILE-OF
HTTP:STC:DL:ESIGNAL-MUL-FILE-OF
HTTP:STC:DL:XLS-PIC-REC-MC
HTTP:STC:DL:MAL-WEBEX-WRF
HTTP:STC:DL:A-PDF-RCE
HTTP:STC:DL:PPT-MS-OGRAPH
HTTP:STC:DL:AOL-RTX
HTTP:STC:DL:QP-S3M-OF
HTTP:STC:DL:SWF-OPENER-BOF
HTTP:STC:DL:OLE-STRUCTURE-RCE
HTTP:STC:DL:ASTONSOFT-DBR-BO
HTTP:STC:DL:MINI-STREAM-PLS-OF
HTTP:STC:DL:GALAN-BO
HTTP:STC:DL:PEAZIP-CINJ
HTTP:STC:DL:XLS-BIN-OF
HTTP:STC:DL:XLS-FIELD-MC
HTTP:STC:DL:XLS-OBJECTLINK
HTTP:STC:DL:XLS-MOD-BYTES
HTTP:STC:DL:WEBEX-ATDL-OF
HTTP:STC:DL:XLS-BIFF-MC
HTTP:STC:DL:VISIO-OBJ-TAG
HTTP:STC:DL:MS-MEDIA-DVR
HTTP:STC:DL:PPT-NOTES-MC
HTTP:STC:DL:MCAF-LHA-OF
HTTP:STC:DL:QT-PV-OF
HTTP:STC:DL:XLS-INT-OR
HTTP:STC:DL:PDFXCHANGE-AX
HTTP:STC:DL:NUANCE-LAUNCH
HTTP:STC:DL:FOXIT-READER-ESCAPE
HTTP:STC:DL:ORACLE-LOTUS-123
HTTP:STC:DL:MIDICONTROLEVENT
HTTP:STC:DL:QT-EMBED-JS
HTTP:STC:DL:MS-WIN-HLP-MC
HTTP:STC:DL:PPT-OFFART-ATOM-RCE
HTTP:STC:DL:REAL-3G2-WRITEAV-MC
HTTP:STC:DL:NOKIA-PLAYER-DOS
HTTP:STC:DL:NETOP-DWS-BOF
HTTP:STC:DL:PPT-SOUND-OBJ-OF
HTTP:STC:DL:XLS-FILE-IMPORT
HTTP:STC:DL:WORD-SMARTTAG
HTTP:STC:DL:PPT-TXMASTERSTYLE
HTTP:STC:DL:GENSTAT-GWB-OF
HTTP:STC:DL:IRAI-AUTOMGEN-RCE
HTTP:STC:DL:MS-OFFICE-EXCEL-MC
HTTP:STC:DL:IRFANVIEW-RLE-DC-BO
HTTP:STC:DL:TOTAL-TVP-BO
HTTP:STC:DL:METASTOCK-RCE
HTTP:STC:DL:CYTEL-STXACT-CY3-BO
HTTP:STC:DL:MACRO-EXPRO-MXE-OF
HTTP:STC:DL:MS-OFFICE-WORD-BO
HTTP:STC:DL:POWER-AUDIO-DOS
HTTP:STC:DL:JRE-ZIP-READCEN
HTTP:STC:DL:MAL-RUBY
HTTP:STC:DL:XLS-DATA-RECORD
HTTP:STC:DL:XLS-SHEET-OBJ
HTTP:STC:DL:XLS-SXVIEW-REC
HTTP:STC:DL:XLS-SET-FONT
HTTP:STC:DL:XLS-SST
HTTP:STC:DL:OLE-ART-INV
HTTP:STC:DL:ACDSEE-XPM-VALUES
HTTP:STC:DL:LOTUS-URL-RCE
HTTP:STC:DL:GNOME-RC4-BO
HTTP:STC:DL:CLAMAV-PE-INT
HTTP:STC:DL:APPLE-PICT
HTTP:STC:DL:EMF-OF
HTTP:STC:DL:BITDEFEND-SCRIPT
HTTP:STC:DL:CLAMAV-MEW-PACKED
HTTP:STC:DL:JRE-APPLET2CLASS-LD
HTTP:STC:DL:LIBSNDFILE-PAF-OF
HTTP:STC:DL:CLAMAV-JPEG-DOS
HTTP:STC:DL:FFMPEG-READ-OF
HTTP:STC:DL:JVM-READMABCURVE
HTTP:STC:DL:COOLPLAYER-PLAYLIST
HTTP:STC:DL:APPLE-QT-H264-BOF
HTTP:STC:DL:APPLE-DMG-VOLNAME
HTTP:STC:DL:AV-CAB-HEADER
HTTP:STC:DL:QUO-ESIGNAL-BOF
HTTP:STC:DL:QT-PANORAMA-ATOM
HTTP:STC:DL:PPT-PP7-MC
HTTP:STC:DL:PPT-SLIDEATOM
HTTP:STC:DL:QT-COLOR-ATOM
HTTP:STC:DL:SEARCHMS-EXEC
HTTP:STC:DL:PPT-VIEWER-MEMALLOC
HTTP:STC:DL:VLC-MP4-BOF
HTTP:STC:DL:WMP-SKIN-DECOMP
HTTP:STC:DL:WORD-TEXTBOX
HTTP:STC:DL:XLS-ARR-INDEX
HTTP:STC:DL:VLC-MATROSKA
HTTP:STC:DL:XLS-HFPICT
HTTP:STC:DL:XLS-DBORPARAMQRY
HTTP:STC:DL:XLS-INDEX
HTTP:STC:DL:LIBFLAC-PIC-TYPE
HTTP:STC:DL:OFFICEART-RCE
HTTP:STC:DL:JAVA-SB-RES
HTTP:STC:DL:WORKS-WPS-OF
HTTP:STC:DL:MS-WMF-DOS
HTTP:STC:DL:MS-NET-CLILOADER-MC
HTTP:STC:DL:MAL-WMV-MEDIA
HTTP:STC:DL:MS-HELP-CNT-BO
HTTP:STC:DL:MPLAYER-SAMI
HTTP:STC:DL:OO-RTF
HTTP:STC:DL:LIBFLAC-PIC-DESC
HTTP:STC:DL:EPS-DSC-BOF
HTTP:STC:DL:OFFICE-VBA-UAF
HTTP:STC:DL:MPEG4-3IVX-FILE
HTTP:STC:DL:DIRECTX-SAMI
HTTP:STC:DL:MAL-WOFF
HTTP:STC:DL:QTPICT-REC-BO
HTTP:STC:DL:QT-TOQTPOINTER
HTTP:STC:DL:ACDSEE-XBM-WIDTH
HTTP:STC:DL:MS-OFFICE-RCE
HTTP:STC:DL:PROSHOW-PSH-FILE-OF
HTTP:STC:DL:MFC-DOC-TITLE
HTTP:STC:DL:EXESCOPE-FILE-BO
HTTP:STC:DL:ISPVM-SYS-XCF-BOF
HTTP:STC:DL:MAL-M3U
HTTP:STC:DL:XLS-LINKED-LIST
HTTP:STC:DL:WORDPAD-PRL
HTTP:STC:DL:XLS-FILTER-REC
HTTP:STC:DL:XLS-FORMAT-ARRAY
HTTP:STC:DL:WORD-MAL-DOC
HTTP:STC:DL:WPD-WP3-TABLE-BO
HTTP:STC:DL:XLS-FEATHEADER
HTTP:STC:DL:S3M-BO
HTTP:STC:DL:CVE-2013-3893-DROP
HTTP:STC:DL:CRYSTAL-RPT-OLE
HTTP:STC:DL:MOVIEPLAY-LST-BOF
HTTP:STC:DL:MAL-PLF
HTTP:STC:DL:RAW-ZLIB-PERL
HTTP:STC:DL:OO-OLE
HTTP:STC:DL:CLAMAV-PE-BO
HTTP:STC:DL:CLAMAV-UPX-BO
HTTP:STC:DL:NUMARK-M3U-BO
HTTP:STC:DL:SUBEDIT-SUBTITLE-BO
HTTP:STC:DL:CRYSTAL-PLYLIST-BOF
HTTP:STC:DL:MAL-WAV-FILE
HTTP:STC:DL:CAIN-ABEL-RCE
HTTP:STC:DL:LIBTIFF-BOF
HTTP:STC:DL:OFFICEART-PROP
HTTP:STC:DL:APPLE-CORE-IMAGE-BO
HTTP:STC:DL:GD-GRAPHICS-DOS
HTTP:STC:DL:MAL-MEDIA-BOF
HTTP:STC:DL:WINMOUNT-ZIP
HTTP:STC:DL:SOPHOS-MAL-VISIO
HTTP:STC:DL:VLC-TY-BO
HTTP:STC:DL:WORDTRAINER-ORD
HTTP:STC:DL:VLC-MEDIA-PLY-APE
HTTP:STC:DL:MS-XL-2003-NULL-DOS
HTTP:STC:DL:ULTRAISO-CCD-IMG
HTTP:STC:DL:SONIQUE-XPL-BOF
HTTP:STC:DL:VLC-MEDIA-PLY-ASS
HTTP:STC:DL:VLC-XSPF-MEM
HTTP:STC:DL:MAL-MP3-BOF
HTTP:STC:DL:WINSOFTMAGIC-PNG
HTTP:STC:DL:IRFANVIEW-ICO-DOS
HTTP:STC:DL:COREL-PAINT-PNG
HTTP:STC:DL:IRFANVIEW-IFF-BOF
HTTP:STC:DL:VKPLY-MID-FILE-BOF
HTTP:STC:DL:VLC-PLY-RT-BOF
HTTP:STC:DL:MS-DOC-STREAM-CE
HTTP:STC:DL:WINPLOT-PLOT2D-BO
HTTP:STC:DL:EDD-FILE-BOF
HTTP:STC:DL:MS-WORD-BULLET
HTTP:STC:DL:VLC-TTA-OF
HTTP:STC:DL:MS-WMP-WAV-DOS
HTTP:STC:DL:SRT-FILE-OF
HTTP:STC:DL:EWP-FILE-BOF
HTTP:STC:DL:TURNTABLES
HTTP:STC:DL:MS-PNG-IMG-CE
HTTP:STC:DL:ORB-MP3-DOS
HTTP:STC:DL:REALPLAYER-SWF-BO
HTTP:STC:DL:WINASM-STUDIO-BOF
HTTP:STC:DL:LIBPNG-TRAN-CHLT-BO
HTTP:STC:DL:OPENOFFICE-DOC
HTTP:STC:DL:APPLE-QT-FLIC-BO
HTTP:STC:DL:MS-VB-VB6STKIT
HTTP:STC:DL:WORD-SPLASH-LIST-BO
HTTP:STC:DL:MEDIA-FILE-BOF
HTTP:STC:DL:HEX-WORKSHP-CMAP-CE
HTTP:STC:DL:XILISOFT-VIDEO-BOF
HTTP:STC:DL:INTELLITAMPER-CFG
HTTP:STC:DL:INTELLITAMPER-CAT
HTTP:STC:DL:SYM-AV-RAR-BO
HTTP:STC:DL:FF-LOOP-DOS
HTTP:STC:DL:XLS-SLK-PICTURE-RCE
HTTP:STC:DL:XPAT-MAL-XML
HTTP:STC:DL:MSWMM-OF
HTTP:STC:DL:EXCEL-UAF-RCE
HTTP:STC:DL:MS-WORD-WORDART
HTTP:STC:DL:IRFANVIEW-MC
HTTP:STC:DL:APPLE-QT-OBJI
HTTP:STC:DL:QT-PDAT
HTTP:STC:DL:WORD-STRING
HTTP:STC:DL:MS-POWRPONT-PPT-RCE
HTTP:STC:DL:SVG-FILE-DOS
HTTP:STC:DL:PROJECT-FILE-RCE
HTTP:STC:DL:REALPLY-MP3-DOS
HTTP:STC:DL:MIDI-PLY-MAMX-BOF
HTTP:STC:DL:APPLE-QT-JP2-DOS
HTTP:STC:DL:MP4-FILE-RCE
HTTP:STC:DL:EOT-IO
HTTP:STC:DL:MS-PICTURE-MGR-AV
HTTP:STC:DL:AIFF-FILE-DOS
HTTP:STC:DL:WORD-STSH-RCE
HTTP:STC:DL:PPT-SHAPES-MEM
HTTP:STC:DL:MS-OFFICE-STR-RCE
HTTP:STC:DL:WORD-DOC-BOF
HTTP:STC:DL:MS-PUBLISHER-MC
HTTP:STC:DL:ZIP-FOR-MEDIA
HTTP:STC:DL:REALPLY-URL-BOF
HTTP:STC:DL:WORD-FILE-MEM
HTTP:STC:DL:IRFANVIEW-TIF-DC-BO
HTTP:STC:DL:SOPHOS-CAB-FILE-OF
HTTP:STC:DL:MAL-OGG-FILE
HTTP:STC:DL:APPLE-QT-TEXML
HTTP:STC:DL:MS-OFFICE-2010-RCE
HTTP:STC:DL:VISIWAVE-SITE-BOF
HTTP:STC:DL:MINI-STREAM-ASX-BOF
HTTP:STC:DL:MS-MEDIA-DECOMP
HTTP:STC:DL:MS-WIN-MOVIE-MKR-MC
HTTP:STC:DL:COOLPDF-READER-BO
HTTP:STC:DL:OFFICE-PICT-MC
HTTP:STC:DL:IRFANVIEW-IMXCF-OF
HTTP:STC:DL:WORD-PPAX
HTTP:STC:DL:XORG-PCF-BO
HTTP:STC:DL:MS-WMF-ESCSET-CE
HTTP:STC:DL:MS-WMF-PARSE
HTTP:STC:DL:APPLE-QT-RNET-OF
HTTP:STC:DL:MS-WORKS9-RTF
HTTP:STC:DL:SOPHOS-RAR-FILTER
HTTP:STC:DL:APPLE-QT-QTIF-DOS
HTTP:STC:DL:XENORATE-XPL-BOF
HTTP:STC:DL:MS-TTF-PARSING
HTTP:STC:DL:ORACLE-JPEG-QCD-OF
HTTP:STC:DL:XLS-PIVOT
HTTP:STC:DL:PPT-TEXTBYTESATM-BO
HTTP:STC:DL:VBA-MEM-CORRUPT
HTTP:STC:DL:MAL-AIFF
HTTP:STC:DL:GIMP-XWD-BO
HTTP:STC:DL:SOPHOS-PDF-FILE-OF
HTTP:STC:DL:VLC-SWF-RCE
HTTP:STC:DL:DIRECTPLAY-HEAP-OF
HTTP:STC:DL:SOPHOS-RAR-VMSF-RGB
HTTP:STC:DL:LIBXML2-ENTRY-NAME
HTTP:STC:DL:QUICKTIME-PNSIZE
HTTP:STC:DL:ONENOTE-INFO-DISC
HTTP:STC:DL:VISIO-TYPE-CONF
HTTP:STC:DL:KINGVIEW-LOGFILE-BO
HTTP:STC:DL:MS-GDI32-POLYLINE
HTTP:STC:DL:QUICKTIME-PAINTPOLY
HTTP:STC:DL:WIN-EXE-DOWNLOAD
HTTP:STC:DL:MSOFFICE-MSO-RCE
HTTP:STC:DL:OPEN-TYPE-RCE
HTTP:STC:DL:APPLE-QT-MOV-DOS
HTTP:STC:DL:PPT-SCRIPT
HTTP:STC:DL:APPLE-QT-MJPEG-OF
HTTP:STC:DL:QT-TEXML-BOF
HTTP:STC:DL:CSOUND-GETNUM-BOF
HTTP:STC:DL:OFF-GDI-HOF
HTTP:STC:DL:EICAR
HTTP:STC:DL:MS-PP-PRESENT-RCE
HTTP:STC:DL:XLS-VERSIONINFO
HTTP:STC:DL:WMF-HEAPOF
HTTP:STC:DL:OO-WORD-TABLE
HTTP:STC:DL:WORDPAD-FONT-CONV
HTTP:STC:DL:URSOFT-W32DASM-BOF
HTTP:STC:DL:QT-SMIL-FILEHAND
HTTP:STC:DL:XLS-NULL-PTR
HTTP:STC:DL:VLC-FORMAT-STRING
HTTP:STC:DL:APPLE-QT-JPEG-2000
HTTP:STC:DL:CISCO-WEBEX-ATDL
HTTP:STC:DL:APPLE-QT-TARGA-BO
HTTP:STC:DL:CISCO-FORMAT-PLY-MC
HTTP:STC:DL:QT-PICT-FILE-MC
HTTP:STC:DL:MSDOTNET-FUNC-PTR
HTTP:STC:DL:XLS-WOPT
HTTP:STC:DL:WEBEX-ATDL-BOF
HTTP:STC:DL:WEBEX-ATAS
HTTP:STC:DL:MAL-WIN-BRIEFCASE-1
HTTP:STC:DL:APPLE-ITUNES-BOF
HTTP:STC:DL:GIMP-XWD-HEAP-BO
HTTP:STC:DL:GOOGLE-PICASA-OVF
HTTP:STC:DL:VISIO-VSD-MEM
HTTP:STC:DL:MS-OBJ-PACKAGER-RCE
HTTP:STC:DL:PUB-OPY
HTTP:STC:DL:MS-EXCEL-TXOOBJ-MC
HTTP:STC:DL:DS-ATOM-TABLE
HTTP:STC:DL:MAL-HLP-CHM
HTTP:STC:DL:QT-CRGN-ATOM
HTTP:STC:DL:FAX-EDITOR-RCE
HTTP:STC:DL:GSTREAMER-QT-OF
HTTP:STC:DL:MS-FONTMATRIX
HTTP:STC:DL:EMF-EMR-INT
HTTP:STC:DL:KINGSOFT-FONT-BO
HTTP:STC:DL:CAB-VULNS
HTTP:STC:DL:QUICKTIME-QTVR-BO-2
HTTP:STC:DL:ARJ-BO
HTTP:STC:DL:MS-GDI-INT-OVF
HTTP:STC:DL:MS-ACCESS-MEM-CORR
HTTP:STC:DL:MS-OFFICE-PICT-MC
HTTP:STC:DL:QUICKTIME-QTVR-BOF
HTTP:STC:DL:SUSPICIOUS-FILE
HTTP:STC:DL:MSCOMCTL-ACTIVEX
HTTP:STC:DL:MS-VISUAL-CPP-RC-BO
HTTP:STC:DL:MAL-WIN-BRIEFCASE-2
HTTP:STC:DL:MS-VISIO-OBJ-MC
HTTP:STC:DL:MS-GDI-ICO
HTTP:STC:DL:MS-FOREFRONT-CUP
HTTP:STC:DL:MSPROJECT-MEM
HTTP:STC:DL:MSSQL-BACKUP-MEM
HTTP:STC:DL:MEDIA-FILE-DOS
HTTP:STC:DL:MS-RICHEDIT-RCE
HTTP:STC:DL:MPP-MEM-VAL
HTTP:STC:DL:MS-EMF-PARSE
HTTP:STC:DL:MSHTML-HELP
HTTP:STC:DL:MS-GDI-EMF
HTTP:STC:DL:MS-PAINT-DOS
HTTP:STC:DL:MS-MPEG-LAYER-3-DOS
HTTP:STC:DL:TRUETYPE-PARSE
HTTP:STC:DL:WORDPAD-BO
HTTP:STC:DL:PUB-TEXTBOX
HTTP:STC:DL:PPT-PRINTER-REC-OF
HTTP:STC:DL:OFFICE-PCT
HTTP:STC:DL:OFFICE-BO-RCE
HTTP:STC:DL:PUB-PLC
HTTP:STC:DL:VISIO-OBJ-HEADER
HTTP:STC:DL:OTF-CFF-RCE
HTTP:STC:DL:VISIO-INV-VERSION
HTTP:STC:DL:OFFICE-MAL-PUB
HTTP:STC:DL:PPT-UNK-ANI
HTTP:STC:DL:VCF-SHELLEXECUTE
HTTP:STC:DL:VISIO-VSD-ICON
HTTP:STC:DL:WORD-REC-LEN-OF
HTTP:STC:DL:VISIO-BOF
HTTP:STC:DL:VISIO-COMPRESSION
HTTP:STC:DL:PPT-OEP-ATOM-INV
HTTP:STC:DL:XLS-OBJ-RECORD
HTTP:STC:DL:XLS-OFFICE-DRAWING
HTTP:STC:DL:XLS-FRTWRAPPER
HTTP:STC:DL:XLS-SXDB
HTTP:STC:DL:XLS-BUFF-OR
HTTP:STC:DL:XLS-NAMED-GRAPH
HTTP:STC:DL:XLS-PALETTE
HTTP:STC:DL:XLS-CHART-OBJ
HTTP:STC:DL:XLS-FNGROUPNAME
HTTP:STC:DL:XLS-REPT
HTTP:STC:DL:WORD-SMART-TAGS
HTTP:STC:DL:WORD-SPRM-MEM
HTTP:STC:DL:WORD-RTF-MEM
HTTP:STC:DL:WORD-STYLESHEET-MEM
HTTP:STC:DL:WORD-SPRMTDIAGLINE
HTTP:STC:DL:WORD-IND
HTTP:STC:DL:XLS-AXISPARENT
HTTP:STC:DL:WORD-GLOBAL-INDEX
HTTP:STC:DL:WORD-DPENDGROUP
HTTP:STC:DL:WIN-GDI-METAFILE
HTTP:STC:DL:WORD-DPPOLYCOUNT
HTTP:STC:DL:WMP-SKIN-PARSE
HTTP:STC:DL:WORD-CONV-INT-OF
HTTP:STC:DL:WINVERIFY-TRUST
HTTP:STC:DL:XLS-RTWINDOW
HTTP:STC:DL:MAL-MIC-BICLRUSED
HTTP:STC:DL:MAL-VBP
HTTP:STC:DL:OFFICE-BMP-HEADER
HTTP:STC:DL:MS-WORKS-BO
HTTP:STC:DL:MS-XL-ROW-REC-BO
HTTP:STC:DL:XLW-MEM-CORR
HTTP:STC:DL:XLS-WORKSPACE-IDX
HTTP:STC:DL:XLS-XML-ZIP
HTTP:STC:DL:XLS-SXSTREAMID
HTTP:STC:DL:XLS-SHEET-NAME
HTTP:STC:DL:XLS-STYLE-RECORD
HTTP:STC:DL:XLS-SXVIEW
HTTP:STC:DL:EXCEL-SERIES
HTTP:STC:DL:DOT-NET-INFO-DISC
HTTP:STC:DL:CGM-IMG-BOF
HTTP:STC:DL:COLORMGMT-PATHNAME
HTTP:STC:DL:ACCESS-MEM-CORR
HTTP:STC:DL:DOC-FIB
HTTP:STC:DL:DBP-FILE-BOF
HTTP:STC:DL:EXCEL-REC-TYPE
HTTP:STC:DL:EXCEL-FEAT11
HTTP:STC:DL:ASF-SR
HTTP:STC:DL:DOCX-ACCESS-RCE
HTTP:STC:DL:EXCEL-SST
HTTP:STC:DL:XLS-MAL-RTD-REC
HTTP:STC:DL:XLS-INV-DRAW
HTTP:STC:DL:XLS-MDSXET-REC
HTTP:STC:DL:PAGEMAKER-OF
HTTP:STC:DL:MAL-FILE-BOF
HTTP:STC:DL:WIN-MEDIA-PLY-MC
HTTP:STC:DL:MS-VISUAL-BASIC-BOF
HTTP:STC:DL:MS-DIRECTSHOW-RCE
HTTP:STC:DL:MS-WORDPAD-DOS
HTTP:STC:DL:VML-GRADIENT
HTTP:STC:DL:WORD-LISTOVERRIDE
HTTP:STC:DL:WORD-SECTION-OF
HTTP:STC:DL:RTF-FPARSE-RCE

HTTP:STC:HSC

HTTP:STC:HSC:MS-HSC-URL-VLN
HTTP:STC:HSC:HCP-QUOTE-SCRIPT

HTTP:STC:IE

HTTP:STC:IE:INFINITE-ARRAY
HTTP:STC:IE:CVE-2014-0281-MC
HTTP:STC:IE:VTABLE-RCE
HTTP:STC:IE:LOC-SPOOF
HTTP:STC:IE:DRAG-DROP-MOD
HTTP:STC:IE:TITLE-ELM-CHG
HTTP:STC:IE:HDRLOC-MSITS
HTTP:STC:IE:JS-LOCATION-ASSIGN
HTTP:STC:IE:CENTER-ELE-RCE
HTTP:STC:IE:LAYOUT-GRID
HTTP:STC:IE:9-10-MEM-CORRUPTION
HTTP:STC:IE:9-10-MC
HTTP:STC:IE:CREATETEXTRANGE-2
HTTP:STC:IE:CREATETEXTRANGE
HTTP:STC:IE:CVE-2013-5056-UAF
HTTP:STC:IE:WSZ-EXEC
HTTP:STC:IE:MAL-VB-JSCRIPT
HTTP:STC:IE:MS-TIME-DLL
HTTP:STC:IE:JAVA-SCRIPT-RCE
HTTP:STC:IE:MEM-LEAK
HTTP:STC:IE:IE-HCP-DELETE
HTTP:STC:IE:CODE-EXECUTION
HTTP:STC:IE:GOOGLEBAR-FILE
HTTP:STC:IE:IE-FTP-SCRIPTING
HTTP:STC:IE:GOPHER-IMGTAG
HTTP:STC:IE:BGSOUND-TAG
HTTP:STC:IE:ONMOVE-RCE
HTTP:STC:IE:CACHE-SMDIALOG
HTTP:STC:IE:IE-LOCAL-FORMAT
HTTP:STC:IE:CACHE-EXTERNAL
HTTP:STC:IE:FRAME-FLOOD
HTTP:STC:IE:MEM-CORR-UAF
HTTP:STC:IE:IFRAME-SMB
HTTP:STC:IE:HTA-CONTENT-TYPE
HTTP:STC:IE:MHTML-REDIRECT
HTTP:STC:IE:CVE-2013-3910-UAF
HTTP:STC:IE:IE-REFRESH-OF
HTTP:STC:IE:LOCAL-WEB-FOLDER
HTTP:STC:IE:IE-FTP-CMD
HTTP:STC:IE:CVE-2013-3911-MC
HTTP:STC:IE:IFRAME-FILE
HTTP:STC:IE:DEV-TOOLBAR-RCE
HTTP:STC:IE:CVE-2008-2256-MC
HTTP:STC:IE:CVE-2013-3917-UAF
HTTP:STC:IE:CVE-2013-3914-MC
HTTP:STC:IE:ONROWSINSERTED-RCE
HTTP:STC:IE:TIF-DND
HTTP:STC:IE:DHTML-CCR-INV-OBJ
HTTP:STC:IE:DND-IMG
HTTP:STC:IE:INSERT-ADJACENT-RCE
HTTP:STC:IE:POINTER-AFTERFREE
HTTP:STC:IE:WMP-BMP-OF-1
HTTP:STC:IE:IE-IMG-INF-DOS
HTTP:STC:IE:ONUNLOAD-MEM
HTTP:STC:IE:HTML-TAG-MC
HTTP:STC:IE:MMCN-EXEC
HTTP:STC:IE:CVE-2013-3871-MC
HTTP:STC:IE:COLORBALANCE
HTTP:STC:IE:IEFRAME
HTTP:STC:IE:CSS-HEAP
HTTP:STC:IE:INVALID-LAYOUT
HTTP:STC:IE:IE-MHT-REDIRECT
HTTP:STC:IE:STYLESHEET-OF
HTTP:STC:IE:SETSLICE-OF
HTTP:STC:IE:MEMCORRUPT2
HTTP:STC:IE:IEUNMEM
HTTP:STC:IE:6-10-MEM-CORRUPTION
HTTP:STC:IE:TOSTATICHTML
HTTP:STC:IE:IEXDOM-INFO
HTTP:STC:IE:VML-AFTERFREE
HTTP:STC:IE:EVENT-INVOKE
HTTP:STC:IE:MAL-JPEG
HTTP:STC:IE:WMP-SKIN-EXEC
HTTP:STC:IE:OE-MSHTML-OF
HTTP:STC:IE:SCRIPT-STCK-EXH
HTTP:STC:IE:COMPINST-OF
HTTP:STC:IE:EVENT-HANDLER-RCE
HTTP:STC:IE:10-MEM-CORRUPTION
HTTP:STC:IE:CROSS-FRAME-SCRIPT
HTTP:STC:IE:HTML-HELP-ZONE-BP
HTTP:STC:IE:INV-CSSARR
HTTP:STC:IE:CACHE-CREATERANGE
HTTP:STC:IE:TOSTATIC-DISC
HTTP:STC:IE:TEXTRANGE-OBJ
HTTP:STC:IE:CVE-2013-3208-UAF
HTTP:STC:IE:CSS-IMPORT
HTTP:STC:IE:URI-REDIRECTION
HTTP:STC:IE:MSRAT-NAME-OF2
HTTP:STC:IE:CSS-XDOM-DISC
HTTP:STC:IE:ANIMATION-RCE
HTTP:STC:IE:IE11-HEAPSPRAY-W81
HTTP:STC:IE:FREED-OBJECT
HTTP:STC:IE:TABLE-LAYOUT
HTTP:STC:IE:ATTR-RM-RCE
HTTP:STC:IE:7-LOC-DATA-URI-DOS
HTTP:STC:IE:CVE-2013-3207-UAF
HTTP:STC:IE:HTML-OBJECTS
HTTP:STC:IE:9-MAL-HTML-DOS
HTTP:STC:IE:IE-UNINIT-DOM
HTTP:STC:IE:9-NULL-BYTE-DISC
HTTP:STC:IE:CVE-2014-0263-MC
HTTP:STC:IE:UNINIT-LAYOUT
HTTP:STC:IE:TOSTATIC-XSS
HTTP:STC:IE:DOCUMENT-RCE
HTTP:STC:IE:OVERLAP-TAGS
HTTP:STC:IE:CACHED-OBJ-RCE
HTTP:STC:IE:CVE-2014-0267-MC
HTTP:STC:IE:DHTML-OBJ-CORRUPT
HTTP:STC:IE:MDAC-CACHESIZE-OF
HTTP:STC:IE:EXECCOMMAND-RCE
HTTP:STC:IE:LAYOUT-RCE
HTTP:STC:IE:EVENT-LISTENER-RCE
HTTP:STC:IE:LOCAL-CNT-INJ
HTTP:STC:IE:CLONENODE-RCE
HTTP:STC:IE:MSRAT-NAME-OF-SVR
HTTP:STC:IE:DHTML-HANDLER-RACE
HTTP:STC:IE:CVE-2014-0285-MC
HTTP:STC:IE:HISTORY-GO-MC
HTTP:STC:IE:CREATETEXTRANGE-3
HTTP:STC:IE:ONREADYSTATE
HTTP:STC:IE:STYLESHEET-MC
HTTP:STC:IE:HTML-OBJ-MC
HTTP:STC:IE:XSLT-MC
HTTP:STC:IE:CLIP-MEM
HTTP:STC:IE:CIR-REF
HTTP:STC:IE:MHTML-INFO-DISC
HTTP:STC:IE:OPTION-ELEMENT-RCE
HTTP:STC:IE:SCROLL-EVENT-RCE
HTTP:STC:IE:SELECT-ELEMENT-RCE
HTTP:STC:IE:MARKUP-POINTER-RCE
HTTP:STC:IE:EVENT-HANDLER-INFO
HTTP:STC:IE:ONLOAD-EVT-RCE
HTTP:STC:IE:STYLEOBJ-MEM
HTTP:STC:IE:CVE-2014-0284-MC
HTTP:STC:IE:HTML-TIME
HTTP:STC:IE:FULLMEM-RELOAD3
HTTP:STC:IE:CMSHTMLED-UAF
HTTP:STC:IE:VML-RCE
HTTP:STC:IE:CELEMENT-RCE
HTTP:STC:IE:COMPRESSED-URL
HTTP:STC:IE:CHAN-SCRIPT
HTTP:STC:IE:LAYOUT-UAF
HTTP:STC:IE:CSS-OF
HTTP:STC:IE:AUTH-REFLECTION
HTTP:STC:IE:COL-SPAN
HTTP:STC:IE:SAMEID-RCE
HTTP:STC:IE:MARQUEE-STYLE
HTTP:STC:IE:CFORMELEMENT-RCE
HTTP:STC:IE:CVE-2013-5047-UAF
HTTP:STC:IE:TABLES-MEMCORRUPT
HTTP:STC:IE:CTREENODE-UAF
HTTP:STC:IE:JS-MEM-CORR
HTTP:STC:IE:TIME-RCE
HTTP:STC:IE:MHTML-REDIR-JS
HTTP:STC:IE:IFRAME-NAME-OF
HTTP:STC:IE:PRINT-PREVIEW-CE
HTTP:STC:IE:IE-MEM-CORR
HTTP:STC:IE:INSERTROW-RCE
HTTP:STC:IE:TIME-ELEMENT
HTTP:STC:IE:BOUNDELEMENTS
HTTP:STC:IE:USE-AFTER-FREE
HTTP:STC:IE:X-DOMAIN-INFO
HTTP:STC:IE:USERDATA
HTTP:STC:IE:ONBEFORE-DEACTIVATE
HTTP:STC:IE:NESTED-OBJECT-TAG
HTTP:STC:IE:SYSIMAGE-INFO-DISC
HTTP:STC:IE:FLASH-UAF
HTTP:STC:IE:CLONE-REF-CORRUPT
HTTP:STC:IE:INCOMPLETE-EM
HTTP:STC:IE:FULLMEM-RELOAD2
HTTP:STC:IE:LOCAL-ACCESS-DAT
HTTP:STC:IE:EVENT-HANDLER-MC
HTTP:STC:IE:MHTML-REDIR-INFO
HTTP:STC:IE:HTML-LAYOUT
HTTP:STC:IE:HTML-OB-MEM
HTTP:STC:IE:MERGE-ATTRIB
HTTP:STC:IE:VML-NUM-BOF
HTTP:STC:IE:CSRSS-HE-MSG
HTTP:STC:IE:XML-ELEMENT-RCE
HTTP:STC:IE:SELECT-EMPTY
HTTP:STC:IE:UNINIT-MEM-CORR
HTTP:STC:IE:EMBED-MC
HTTP:STC:IE:JS-MC
HTTP:STC:IE:UNINIT-CORRUPT
HTTP:STC:IE:SETEXP-REFCOUNT
HTTP:STC:IE:MOUSE-MOVE-MEM
HTTP:STC:IE:CTREEPOS-RCE
HTTP:STC:IE:JS-INFO-DISC
HTTP:STC:IE:IFRAME-HTA
HTTP:STC:IE:EOTF-LZCOMP-OF
HTTP:STC:IE:CVE-2013-3874-UAF
HTTP:STC:IE:TABLE-SPAN-CORRUPT
HTTP:STC:IE:FOLDER-COM-EXEC
HTTP:STC:IE:XML-MIME-CORRUPT
HTTP:STC:IE:URI-HANDLER-PDF
HTTP:STC:IE:NULL-PTR-DOS
HTTP:STC:IE:ADDFAVORITE-BOF
HTTP:STC:IE:XML-OBJECTION
HTTP:STC:IE:LI-ELEMENT-DOS
HTTP:STC:IE:MHT-FILE
HTTP:STC:IE:CVE-2013-3908-DISC
HTTP:STC:IE:VERT-ALIGN-DOS
HTTP:STC:IE:TABLE-FRAMESET
HTTP:STC:IE:PNG-IMAGE-BO
HTTP:STC:IE:8-MSHTML-INFO-DISC
HTTP:STC:IE:EXCEPT-HNDL-OF
HTTP:STC:IE:6-STATUS-BAR-SPOOF
HTTP:STC:IE:CROSS-DOMAIN-INFO
HTTP:STC:IE:CSS-DISCLOSURE
HTTP:STC:IE:8-XSS-FILTER
HTTP:STC:IE:POSITION-CSS-DOS
HTTP:STC:IE:FRAME-BORDER-DOS
HTTP:STC:IE:CSS-DOS
HTTP:STC:IE:MULTI-ACTION
HTTP:STC:IE:CSS-PROPERTY-METHOD
HTTP:STC:IE:XDR-PROTOTYPE-DOS
HTTP:STC:IE:MEM-CORRUPT-RCE
HTTP:STC:IE:MS-IE-MEM-RCE
HTTP:STC:IE:NULL-OBJ-RCE
HTTP:STC:IE:SAVE-HISTORY-UAF
HTTP:STC:IE:CHTML-UAF
HTTP:STC:IE:LSGETTRAILINFO-UAF
HTTP:STC:IE:CDISPNODE-UAF
HTTP:STC:IE:INSELM-UAF
HTTP:STC:IE:SETCAPTURE-UAF
HTTP:STC:IE:VML-MEM-CORRUPTION
HTTP:STC:IE:CPASTECOMMAND
HTTP:STC:IE:COMWINDOWPROXY-UAF
HTTP:STC:IE:JIS-CHAR-INFO-DISC
HTTP:STC:IE:REMOVECHILD-UAF
HTTP:STC:IE:CLEMENT-UAF
HTTP:STC:IE:CMARKUPBEHAVIOR-UAF
HTTP:STC:IE:VTABLE-CODE-EXEC
HTTP:STC:IE:7-10-MEM-CORRUPTION
HTTP:STC:IE:UNISCRIBE-FNPS-MC
HTTP:STC:IE:CVE-2013-3871-RCE
HTTP:STC:IE:COPY-PASTE-INFODISC
HTTP:STC:IE:PASTEHTML-RCE
HTTP:STC:IE:COBJECT-ELE-UAF
HTTP:STC:IE:UAF-RCE
HTTP:STC:IE:HRALIGN-OF
HTTP:STC:IE:UTF8-DECODE-OF
HTTP:STC:IE:CMARKUP-UAF
HTTP:STC:IE:9-MEMCORRUPT-DOS
HTTP:STC:IE:GETMARKUPPTR-UAF
HTTP:STC:IE:CCARET-UAF
HTTP:STC:IE:8-CTREENODE-UAF
HTTP:STC:IE:HTML-OBJECTS-MC
HTTP:STC:IE:GETELEMENT-CACHE
HTTP:STC:IE:MALFORMED-URI-BO
HTTP:STC:IE:IE-8-DOM-UN-MEM
HTTP:STC:IE:OBJECT-TAG-XML
HTTP:STC:IE:OBJECT-OF
HTTP:STC:IE:OLE-AUTO
HTTP:STC:IE:OBJECTS-MC
HTTP:STC:IE:DOM-OBJ-MC
HTTP:STC:IE:DHTML-OBJ-MC
HTTP:STC:IE:HTML-XSS
HTTP:STC:IE:CVE-2013-3189-MC
HTTP:STC:IE:TABLECELL-INFO-DISC
HTTP:STC:IE:PAGE-UPDATE-RACE
HTTP:STC:IE:CSS-RACE-CE
HTTP:STC:IE:HTML-OBJ-MEM-CRPTN
HTTP:STC:IE:9-UAF-RCE
HTTP:STC:IE:9-USE-AFTER-FREE
HTTP:STC:IE:UAF-MC
HTTP:STC:IE:MEM-CORR
HTTP:STC:IE:HTML-SANITZ
HTTP:STC:IE:CVE-2013-3845-UAF
HTTP:STC:IE:APPLYELEMENT-UAF
HTTP:STC:IE:COLLECTGARBAGE-B64
HTTP:STC:IE:10-UAF
HTTP:STC:IE:9-UAF-MEM-CORR
HTTP:STC:IE:ONENOTE-URL
HTTP:STC:IE:CVE-2013-3153-MC
HTTP:STC:IE:INSECURE-OBJDEL-UAF
HTTP:STC:IE:UAF-MEM-COR
HTTP:STC:IE:8-10-MEM-CORRUPTION
HTTP:STC:IE:OBJECT-CODE-EXEC
HTTP:STC:IE:8-10-MEM-CORR
HTTP:STC:IE:CVE-2013-3115-MC
HTTP:STC:IE:MS-UAF-MC
HTTP:STC:IE:UNSAFE-MEM-OPER-UAF
HTTP:STC:IE:CVE-2013-3885-UAF
HTTP:STC:IE:JSON-ARRAY-INFO-DIS
HTTP:STC:IE:UAF-MEM-CORR
HTTP:STC:IE:URI-INFODISC
HTTP:STC:IE:10-UAF-MC
HTTP:STC:IE:MSIE-OBJ-UAF
HTTP:STC:IE:LOCATION-X-DOMAIN
HTTP:STC:IE:OBJHAN-ERR-UAF
HTTP:STC:IE:6-7-UAF-RCE
HTTP:STC:IE:UAF-ARBITRARY-CE
HTTP:STC:IE:IMPROPER-REF
HTTP:STC:IE:9-UAF-CE
HTTP:STC:IE:9-UNINITVARS-UAF
HTTP:STC:IE:EVENT-HANDLER-XD
HTTP:STC:IE:6-10-USE-AFTER-FREE
HTTP:STC:IE:UAF-MC-RCE
HTTP:STC:IE:8-UAF-RCE
HTTP:STC:IE:CONT-LOC-ZON-BYPASS
HTTP:STC:IE:SHOWHELP
HTTP:STC:IE:CLSID-IN-FILENAME
HTTP:STC:IE:OBJ-DEL-UAF
HTTP:STC:IE:CSS-MEMORY-CORRUPT
HTTP:STC:IE:MAL-GIF-DOS
HTTP:STC:IE:SHELL-WEB-FOLDER
HTTP:STC:IE:IE-HEADER-XDOM-INFO
HTTP:STC:IE:DIRECTX-SAMI-BO
HTTP:STC:IE:SLAYOUTRUN-UAF
HTTP:STC:IE:CVE-2013-3199-CE
HTTP:STC:IE:FRAME-INJ
HTTP:STC:IE:CVE-2013-3916-RCE
HTTP:STC:IE:ZONE-SPOOF-2
HTTP:STC:IE:CVE-2014-0289-MC
HTTP:STC:IE:CVE-2013-5052-MC
HTTP:STC:IE:CVE-2013-5051-MC
HTTP:STC:IE:ANCHOR-URL-SPOOF
HTTP:STC:IE:CVE-2013-5048-MC
HTTP:STC:IE:MSWEBDVD-NPA
HTTP:STC:IE:CVE-2014-0305-MC
HTTP:STC:IE:VML-FILL-BOF
HTTP:STC:IE:CVE-2014-0273-MC
HTTP:STC:IE:CVE-2014-0271-MC
HTTP:STC:IE:CVE-2014-0277-MC
HTTP:STC:IE:CVE-2014-0283-MC
HTTP:STC:IE:CVE-2014-0287-MC
HTTP:STC:IE:CVE-2014-0274-MC
HTTP:STC:IE:CVE-2014-0276-MC
HTTP:STC:IE:CVE-2014-0286-MC
HTTP:STC:IE:CVE-2014-0290-MC
HTTP:STC:IE:CVE-2014-0270-UAF
HTTP:STC:IE:CVE-2014-0288-MC
HTTP:STC:IE:CVE-2014-0269-MC
HTTP:STC:IE:CVE-2014-0272-MC
HTTP:STC:IE:XML-MEM-COR
HTTP:STC:IE:CVE-2014-0311-UAF
HTTP:STC:IE:CVE-2014-0299-RCE
HTTP:STC:IE:CVE-2014-0303-MC
HTTP:STC:IE:10-CVE-2014-0275-MC
HTTP:STC:IE:URL-FILE-BOF
HTTP:STC:IE:SSL-PROXY-DIS
HTTP:STC:IE:CVE-2014-0298-UAF
HTTP:STC:IE:CVE-2014-0306-RCE
HTTP:STC:IE:CVE-2014-0302-MC
HTTP:STC:IE:CVE-2014-0324-MC
HTTP:STC:IE:11-CVE-2014-0304-MC
HTTP:STC:IE:CVE-2014-0309-MC
HTTP:STC:IE:CVE-2014-0314-MC
HTTP:STC:IE:VBS-BSTR-HEAP-SPRAY
HTTP:STC:IE:8-CVE-2014-0278-MC
HTTP:STC:IE:CVE-2014-0313-BOF
HTTP:STC:IE:CVE-2014-0297-MC
HTTP:STC:IE:CVE-2014-0312-RCE
HTTP:STC:IE:CVE-2014-0322-UAF
HTTP:STC:IE:9-MEM-CORR
HTTP:STC:IE:CVE-2012-6502-INFO
HTTP:STC:IE:CVE-2013-5049-MC
HTTP:STC:IE:CVE-2013-3194-UAF
HTTP:STC:IE:DEREF-OBJ-ACCESS
HTTP:STC:IE:CVE-2013-3875-MC
HTTP:STC:IE:CVE-2013-3912-RCE
HTTP:STC:IE:DIALOG-MANIP
HTTP:STC:IE:DEL-OBJ-REF
HTTP:STC:IE:DESIGNMODE-INFO
HTTP:STC:IE:CVE-2013-3873-MC
HTTP:STC:IE:EOT-WEBFONTS-DL
HTTP:STC:IE:ERROR-HANDLER
HTTP:STC:IE:DOM-CACHE-CORRUPT
HTTP:STC:IE:CVE-2013-3188-MC
HTTP:STC:IE:8-OBJECT-MC
HTTP:STC:IE:6-ADDRESS-BAR-SPOOF
HTTP:STC:IE:10-INT-OVF
HTTP:STC:IE:9-10-OBJERR-UAF
HTTP:STC:IE:10-OBJDEL-UAF
HTTP:STC:IE:CVE-2013-3209-UAF
HTTP:STC:IE:ANIMATEMOTION
HTTP:STC:IE:10-OBJHANDLING-UAF
HTTP:STC:IE:9-MC-RCE
HTTP:STC:IE:10-OBJECT-MC
HTTP:STC:IE:10-OBJ-DEL-UAF
HTTP:STC:IE:ANTIXSS-INFO-DISC
HTTP:STC:IE:8-DOS
HTTP:STC:IE:7-WINDOW-SPOOF
HTTP:STC:IE:CACHE-CLIPDATA
HTTP:STC:IE:CHROME-HTML-CMD-INJ
HTTP:STC:IE:ADDRBOOK-OBJ-DOS
HTTP:STC:IE:6.0-FOR-LOOP-DOS
HTTP:STC:IE:8-CVE-2014-0279-MC
HTTP:STC:IE:CDO-IN-HEADER
HTTP:STC:IE:ADDRBAR-SPOOF-2
HTTP:STC:IE:10-OBJECT-RCE
HTTP:STC:IE:OBJECT-OF1
HTTP:STC:IE:ONBEFORECOPY-UAF
HTTP:STC:IE:OBJ-MGMT-MC
HTTP:STC:IE:MEMCORRUPT1
HTTP:STC:IE:IE-MSHTML-OF
HTTP:STC:IE:MHTML-REDIR
HTTP:STC:IE:ONRESIZE-UAF
HTTP:STC:IE:MAL-DATASTREAM
HTTP:STC:IE:IESTYLE-OBJ
HTTP:STC:IE:EUC-JP-XSS
HTTP:STC:IE:INST-ENG-INT-OF
HTTP:STC:IE:MSRAT-NAME-OF
HTTP:STC:IE:IFRAME-MEM-CORR
HTTP:STC:IE:MSRAT-NAME-OF-SVR2
HTTP:STC:IE:HELPCTR-CODE-EX
HTTP:STC:IE:EXEC-CMD-FILE-SPOOF
HTTP:STC:IE:HTML-FORM-DOS
HTTP:STC:IE:OBJERR-UAF
HTTP:STC:IE:INFOBAR-DOWNLOAD
HTTP:STC:IE:MHTML-XDOM
HTTP:STC:IE:XSS-FILTER-DISC
HTTP:STC:IE:WMP-BMP-OF-3
HTTP:STC:IE:TITLE-BAR-URI
HTTP:STC:IE:REDIRECT-MC
HTTP:STC:IE:SCREEN-DOS
HTTP:STC:IE:URL-HIDING-ENC
HTTP:STC:IE:TEXT-HELP-ZONE-BP
HTTP:STC:IE:ZONE-SPOOF
HTTP:STC:IE:WIN-ADO-EXEC
HTTP:STC:IE:XML-DISCLOSE
HTTP:STC:IE:XML-HANDLE-EXEC
HTTP:STC:IE:VML-VGX-BOF
HTTP:STC:IE:XFRAME-REST-BYPASS
HTTP:STC:IE:XML-RCE
HTTP:STC:IE:JS-VBS-DECODE-OF
HTTP:STC:IE:COL-TAG-CACHE
HTTP:STC:IE:2014-1751-MEM-CORR
HTTP:STC:IE:CSS-XSS
HTTP:STC:IE:CVE-2014-0307-MC
HTTP:STC:IE:ONUNLOAD
HTTP:STC:IE:DEL-TABLE
HTTP:STC:IE:CVE-2014-1755-MC
HTTP:STC:IE:CVE-2014-1753-MC
HTTP:STC:IE:7-CVE-2014-1752-RCE
HTTP:STC:IE:SELECT-ELEMENT
HTTP:STC:IE:FULLMEM-RELOAD
HTTP:STC:IE:HTML-RELOAD-CORRUPT
HTTP:STC:IE:OBJECT-MC
HTTP:STC:IE:XML-HMAC-BYPASS
HTTP:STC:IE:8-OBJ-MC

HTTP:STC:IMG

HTTP:STC:IMG:PNG-IHDR-BAD-PAR
HTTP:STC:IMG:PNG-PLTE-ERROR
HTTP:STC:IMG:GIF-BAD-PARAMETER
HTTP:STC:IMG:PNG-NAME-ERROR
HTTP:STC:IMG:MALFORMED-JPEG
HTTP:STC:IMG:NOT-PNG
HTTP:STC:IMG:NOT-BMP
HTTP:STC:IMG:JPEG-BAD-LENGTH
HTTP:STC:IMG:PNG_IHDR_INVAL_LEN
HTTP:STC:IMG:NOT-GIF
HTTP:STC:IMG:OVERLARGE-BMP
HTTP:STC:IMG:PNG-TRNS-ERROR
HTTP:STC:IMG:BMP-OVERFLOW
HTTP:STC:IMG:PNG_CHUNK_OVERFLOW
HTTP:STC:IMG:NOT-JPEG
HTTP:STC:IMG:MALFORMED-BMP
HTTP:STC:IMG:BMP-BAD-PARAMETER
HTTP:STC:IMG:JPEG-UNDERRUN
HTTP:STC:IMG:OFFEND-TG
HTTP:STC:IMG:OFFEND-GG
HTTP:STC:IMG:EXE-IN-IMAGE
HTTP:STC:IMG:WMP-BMP-OF
HTTP:STC:IMG:WMF-MALFORMED
HTTP:STC:IMG:PNG-IO
HTTP:STC:IMG:BMP-WIDTH-OF
HTTP:STC:IMG:JPEG-MAL-MARKER
HTTP:STC:IMG:BMP-HEADER-UF
HTTP:STC:IMG:WMF-MAL-HEADER
HTTP:STC:IMG:PICT-POLY-UF
HTTP:STC:IMG:MAL-EMF-2
HTTP:STC:IMG:MAL-EMF
HTTP:STC:IMG:MAL-WMF-REC-OF
HTTP:STC:IMG:EXE-FOR-IMG-TYPE
HTTP:STC:IMG:OFFICE-MAL-TIF
HTTP:STC:IMG:TIFF-BOF
HTTP:STC:IMG:XP-MAL-TIFF
HTTP:STC:IMG:OFFICE-FLASHPIX
HTTP:STC:IMG:OFFICE-MAL-TIFF3
HTTP:STC:IMG:EXE-FOR-IMAGE
HTTP:STC:IMG:OFFICE-FLASHPIX2
HTTP:STC:IMG:KODAK-TIFF
HTTP:STC:IMG:PAINT-JPEG-OF
HTTP:STC:IMG:PNG-TEXT
HTTP:STC:IMG:JPEG-HEIGHT-OF
HTTP:STC:IMG:PNG-CHUNK-OF
HTTP:STC:IMG:LIBPNG-ROWS
HTTP:STC:IMG:JDK-ICC
HTTP:STC:IMG:TFF-THUNDER
HTTP:STC:IMG:PICT-UNCOMP-UF
HTTP:STC:IMG:JAVA-GIF-MEM
HTTP:STC:IMG:GOOGLE-SKETCH-BMP
HTTP:STC:IMG:ICO-SIZE-OF
HTTP:STC:IMG:WMF-METASPLOIT
HTTP:STC:IMG:ANI-FILE-DOS
HTTP:STC:IMG:PNG-WIDTH
HTTP:STC:IMG:MS-OFFICE-GIF
HTTP:STC:IMG:BMP-HDR-IO
HTTP:STC:IMG:LIBPNG-CHUNK-OV
HTTP:STC:IMG:MALFORMED-EMF-TAG
HTTP:STC:IMG:MS-GIFGDI-OF
HTTP:STC:IMG:WMF-METASPLOIT2
HTTP:STC:IMG:JPEGDECODERAW-FUNC
HTTP:STC:IMG:ANI-BLOCK-STR2
HTTP:STC:IMG:SUN-JAVA-PNG-BOF
HTTP:STC:IMG:EMF-DOWNLOAD
HTTP:STC:IMG:PNG-HEIGHT
HTTP:STC:IMG:PHP-AS-GIF
HTTP:STC:IMG:WMF-METASPLOIT-GZ
HTTP:STC:IMG:WMF-SETPALETTE
HTTP:STC:IMG:MS-BMP-OF
HTTP:STC:IMG:JPEG-SCRIPT
HTTP:STC:IMG:WMF-DOWNLOAD
HTTP:STC:IMG:TARGA-IMG-HEAP
HTTP:STC:IMG:JPEG-WIDTH-OF

HTTP:STC:IMG:JPEG

HTTP:STC:IMG:JPEG:WIN-COLOR

HTTP:STC:JAVA

HTTP:STC:JAVA:JAVADEPLOY-RCE
HTTP:STC:JAVA:SANDBOX-BYPASS
HTTP:STC:JAVA:GIF-MEMCORRUPT
HTTP:STC:JAVA:JPEGIMGEWRITER-MC
HTTP:STC:JAVA:JNLP-CHARSET-OF
HTTP:STC:JAVA:JAVA-VM-ARGS-OF
HTTP:STC:JAVA:JPEGIMAGE-OF
HTTP:STC:JAVA:IMGLIB-LOOKUPBYTE
HTTP:STC:JAVA:RUNTIME-ENV-BO
HTTP:STC:JAVA:CLAS-VERIFY-ABORT
HTTP:STC:JAVA:BYTCOMPNT-RSTR-MC
HTTP:STC:JAVA:PACK200-INT
HTTP:STC:JAVA:JAR-PROCESS-OF
HTTP:STC:JAVA:JAR-FILE-DOWNLOAD
HTTP:STC:JAVA:MIXERSEQ-OF
HTTP:STC:JAVA:SETDIFFICM-BOF
HTTP:STC:JAVA:DOCBASE-BOF
HTTP:STC:JAVA:JNDI-BYPASS
HTTP:STC:JAVA:TYPE1-FONT
HTTP:STC:JAVA:BASICSERVICEIMPL
HTTP:STC:JAVA:BEAST-WEBSOCKET
HTTP:STC:JAVA:GETSOUNDBANK-OF
HTTP:STC:JAVA:ORA-BYTECODE-CE
HTTP:STC:JAVA:JRE-CAL-PRIV-ESLN
HTTP:STC:JAVA:JRE-IMG-PARS-DOS
HTTP:STC:JAVA:IBM-CLASS-LDR-RCE
HTTP:STC:JAVA:IBM-RMI-PROXY-RCE
HTTP:STC:JAVA:IBM-CLASS-RCE
HTTP:STC:JAVA:FONT-PROCESSING
HTTP:STC:JAVA:WEBSTART
HTTP:STC:JAVA:APPLET-CLASS-FILE
HTTP:STC:JAVA:SEC-SLIDER-BYPASS
HTTP:STC:JAVA:JAX-WS-RCE
HTTP:STC:JAVA:FINAL-FIELD-OW
HTTP:STC:JAVA:ORACLE-IMGLIB-OVF
HTTP:STC:JAVA:CONCHASHMAP
HTTP:STC:JAVA:MAL-JNLP-FILE
HTTP:STC:JAVA:SQL-DRIVERMANAGER
HTTP:STC:JAVA:JMXMBEAN-RCE
HTTP:STC:JAVA:APPLET-REFLECTRCE
HTTP:STC:JAVA:PRVDR-SKLTON-SB
HTTP:STC:JAVA:SHORT-COMPONENT
HTTP:STC:JAVA:LOOKUPBYTEBI-MC
HTTP:STC:JAVA:FONT-PARSING
HTTP:STC:JAVA:MORT-LIGATURE-BO
HTTP:STC:JAVA:APPLET-RCE
HTTP:STC:JAVA:METHODHANDLE
HTTP:STC:JAVA:JMX-FINDCLASS-RCE
HTTP:STC:JAVA:GSUB-BOF
HTTP:STC:JAVA:ATOMIC-SB-BREACH
HTTP:STC:JAVA:IMG-SETPIXELS-OF
HTTP:STC:JAVA:GSUB-TABLE-BO
HTTP:STC:JAVA:IMG-INTEGER-MC
HTTP:STC:JAVA:STOREIMG-ARRAY-BO
HTTP:STC:JAVA:TRUE-TYPE-FONT-OF

HTTP:STC:MCAFEE

HTTP:STC:MCAFEE:FREESCAN-LEAK

HTTP:STC:MOZILLA

HTTP:STC:MOZILLA:WGL-BUFFERDATA
HTTP:STC:MOZILLA:JIT-ESCAPE-MC
HTTP:STC:MOZILLA:MAL-REG-EX
HTTP:STC:MOZILLA:FIREFLASH
HTTP:STC:MOZILLA:FIREUNICODE
HTTP:STC:MOZILLA:IFRAME-STYLE
HTTP:STC:MOZILLA:MESA-TEXIMG2D
HTTP:STC:MOZILLA:FIRESEARCH
HTTP:STC:MOZILLA:ARRAY-DANGLE
HTTP:STC:MOZILLA:CONSTRUCTFRAME
HTTP:STC:MOZILLA:FIREBURN
HTTP:STC:MOZILLA:NAV-OBJ-EXEC
HTTP:STC:MOZILLA:MOZ-FLOAT-OF
HTTP:STC:MOZILLA:SHELL
HTTP:STC:MOZILLA:JSCRIPT-CLIP
HTTP:STC:MOZILLA:STR-REPLACE
HTTP:STC:MOZILLA:WRAPPED-JAVA
HTTP:STC:MOZILLA:STR-RPLACE-MEM
HTTP:STC:MOZILLA:IFRAME-SRC
HTTP:STC:MOZILLA:JS-EVAL
HTTP:STC:MOZILLA:FF-COMPARTMENT
HTTP:STC:MOZILLA:SVG-CODE-INJ
HTTP:STC:MOZILLA:DEFINESETTER
HTTP:STC:MOZILLA:CSSVALUE-MEM
HTTP:STC:MOZILLA:FF-WYCIWYG
HTTP:STC:MOZILLA:MAL-SVG-INDEX
HTTP:STC:MOZILLA:SIDEBAR
HTTP:STC:MOZILLA:XUL-TREE
HTTP:STC:MOZILLA:SVG-XML-INT-OF
HTTP:STC:MOZILLA:MOZ-TAG-ORDER
HTTP:STC:MOZILLA:ICONURL-JS
HTTP:STC:MOZILLA:SVG-DATA
HTTP:STC:MOZILLA:TITLE-OF
HTTP:STC:MOZILLA:REDUCE-RIGHT
HTTP:STC:MOZILLA:FIREFOX-ENG-MC
HTTP:STC:MOZILLA:SSL-ICON
HTTP:STC:MOZILLA:CONTENT-INJECT
HTTP:STC:MOZILLA:XBL-TAG-RM
HTTP:STC:MOZILLA:MOZ-BINDING
HTTP:STC:MOZILLA:PARAM-OF
HTTP:STC:MOZILLA:PKCS11-RCE
HTTP:STC:MOZILLA:FF-ARRAY-SLICE
HTTP:STC:MOZILLA:PROPTAB-MEM
HTTP:STC:MOZILLA:TABLE-BG-UAF
HTTP:STC:MOZILLA:OBJ-TYPE-CURR
HTTP:STC:MOZILLA:CANVAS-BO
HTTP:STC:MOZILLA:PLUGIN-ACL
HTTP:STC:MOZILLA:SVG-RCE
HTTP:STC:MOZILLA:FF-SELECT-UAF
HTTP:STC:MOZILLA:FIREFOX-NSTREE
HTTP:STC:MOZILLA:MCHANNEL-UAF
HTTP:STC:MOZILLA:NNTP-URL
HTTP:STC:MOZILLA:OGG-VORBIS
HTTP:STC:MOZILLA:FF-INFO
HTTP:STC:MOZILLA:FRAME-COMMENT
HTTP:STC:MOZILLA:SOAPPARAM-OF
HTTP:STC:MOZILLA:LAYOUT-HEAP-OF
HTTP:STC:MOZILLA:SKYPE-EXT-CLIP
HTTP:STC:MOZILLA:RDF-FILE-MC
HTTP:STC:MOZILLA:PLUGINSPAGE-CE
HTTP:STC:MOZILLA:FF-DESGNMD-DOS
HTTP:STC:MOZILLA:THUNDERBIRD-JS
HTTP:STC:MOZILLA:WINDOWS-PRINT
HTTP:STC:MOZILLA:ONSTARTREQUEST
HTTP:STC:MOZILLA:FF-UI-NULL-PTR
HTTP:STC:MOZILLA:ARGMNT-FUNC-CE
HTTP:STC:MOZILLA:FF-HTML-PS-DOS
HTTP:STC:MOZILLA:FF-SIDEBAR-DOS
HTTP:STC:MOZILLA:FF-JSFRAME-DOS
HTTP:STC:MOZILLA:FF-KEYGEN-DOS
HTTP:STC:MOZILLA:FF-ONUNLOAD
HTTP:STC:MOZILLA:FF-LAYOUT-MC
HTTP:STC:MOZILLA:FF-URL-SPOOF
HTTP:STC:MOZILLA:DOC-WRITE-MC
HTTP:STC:MOZILLA:FF-XDG-OPEN
HTTP:STC:MOZILLA:FF-ADDR-SPOOF
HTTP:STC:MOZILLA:FF-ABT-BLK-SPF
HTTP:STC:MOZILLA:FF-ERROR-INFO
HTTP:STC:MOZILLA:FF-RANGESCRIPT
HTTP:STC:MOZILLA:FF-ACTION-PROM
HTTP:STC:MOZILLA:FF2-VS-INF-DIS
HTTP:STC:MOZILLA:DOMNODEREMOVED
HTTP:STC:MOZILLA:QUERYINT-OF
HTTP:STC:MOZILLA:TABLE-FRAMES
HTTP:STC:MOZILLA:FF2-PM-INF-DIS
HTTP:STC:MOZILLA:GIF89A-EXT
HTTP:STC:MOZILLA:FF-REMOTE-MC
HTTP:STC:MOZILLA:OFFSET-MEM-COR
HTTP:STC:MOZILLA:FF-IMG-TAG-DOS
HTTP:STC:MOZILLA:FF-XSL-TRANS
HTTP:STC:MOZILLA:SVG-CLIPPATH
HTTP:STC:MOZILLA:XUL-FRAMETREE
HTTP:STC:MOZILLA:XUL-NULL-MENU
HTTP:STC:MOZILLA:FIREFOX-XPCOM
HTTP:STC:MOZILLA:MOZ-GRID-DOS
HTTP:STC:MOZILLA:XML-MEM-CORR
HTTP:STC:MOZILLA:LAYOUT-MC
HTTP:STC:MOZILLA:CLEARTEXTRUN
HTTP:STC:MOZILLA:EVENT-DLOAD
HTTP:STC:MOZILLA:NONASCII-LINK
HTTP:STC:MOZILLA:READYSTATE-UAF
HTTP:STC:MOZILLA:SVG-IN-XBL-UAF
HTTP:STC:MOZILLA:FF2-DIR-TRAV
HTTP:STC:MOZILLA:FF-TOSOURCE
HTTP:STC:MOZILLA:XBL-METHD-EVAL
HTTP:STC:MOZILLA:HOST-MAL-IDN
HTTP:STC:MOZILLA:FIRE-FAVICON
HTTP:STC:MOZILLA:FF-PLUGINSPAGE
HTTP:STC:MOZILLA:FF-DEL-OBJ-REF
HTTP:STC:MOZILLA:ADDON-RCE
HTTP:STC:MOZILLA:FIREFOX-MC
HTTP:STC:MOZILLA:NSCSSVALUE-OF
HTTP:STC:MOZILLA:FIREFOX-INPUT
HTTP:STC:MOZILLA:DUP-LOC-HEADER
HTTP:STC:MOZILLA:OVERFLOW-EVENT

HTTP:STC:NORTON

HTTP:STC:NORTON:LAUNCHURL-HTTP
HTTP:STC:NORTON:NAV-AX-DOS

HTTP:STC:OPERA

HTTP:STC:OPERA:OPERA-CONFIG
HTTP:STC:OPERA:DOCUMENT-WRITE
HTTP:STC:OPERA:FILE-URL-OF
HTTP:STC:OPERA:TREE-TRAVERSE-MC
HTTP:STC:OPERA:JPG-DHT-MC
HTTP:STC:OPERA:11.11-DOS
HTTP:STC:OPERA:SEARCH-HIST
HTTP:STC:OPERA:ESCAPE-SEQ-DOS
HTTP:STC:OPERA:NULL-PTR-DOS
HTTP:STC:OPERA:HREF-TAG-DOS
HTTP:STC:OPERA:DOC-STYLSHET-DOS
HTTP:STC:OPERA:ADDR-BAR-URI-SPF
HTTP:STC:OPERA:SVG-CLIPPATH-MC
HTTP:STC:OPERA:GIF-PROC-MC
HTTP:STC:OPERA:HTML-CANVAS-RCE
HTTP:STC:OPERA:LINKS-PANEL-XSS
HTTP:STC:OPERA:GETIMAGEDATA-MC
HTTP:STC:OPERA:SVG-ANIMATION
HTTP:STC:OPERA:TELNET-URI
HTTP:STC:OPERA:ALERTBOX-BOVF

HTTP:STC:OUTLOOK

HTTP:STC:OUTLOOK:SHELL-PROFILE
HTTP:STC:OUTLOOK:WABFILE-STC
HTTP:STC:OUTLOOK:WABFILE
HTTP:STC:OUTLOOK:WAB-BOF
HTTP:STC:OUTLOOK:MAILTO-QUOT-CE
HTTP:STC:OUTLOOK:OUTLOOK-PRF

HTTP:STC:SAFARI

HTTP:STC:SAFARI:WEBKIT-ELEMENTS
HTTP:STC:SAFARI:HELP-RUNSCRPT
HTTP:STC:SAFARI:DISK-URI
HTTP:STC:SAFARI:SSH-URI
HTTP:STC:SAFARI:CONT-EDITABLE
HTTP:STC:SAFARI:WEBKIT-LIBXSLT
HTTP:STC:SAFARI:MAL-REGEX
HTTP:STC:SAFARI:WEBKIT-SVG-MARK
HTTP:STC:SAFARI:MUL-FUNC-DOS
HTTP:STC:SAFARI:INNERHTML-MC
HTTP:STC:SAFARI:CHARSET-XFORM
HTTP:STC:SAFARI:CHILD-REMOVAL
HTTP:STC:SAFARI:WEBKIT-SVG-MC
HTTP:STC:SAFARI:JSARR-SORT-HOVF
HTTP:STC:SAFARI:IMG-USE-FREE
HTTP:STC:SAFARI:WEBKIT-TITLE
HTTP:STC:SAFARI:RUNIN-UAF
HTTP:STC:SAFARI:FILE-URI
HTTP:STC:SAFARI:WEBKIT-FREE-CE
HTTP:STC:SAFARI:CSS-FORMAT-HINT
HTTP:STC:SAFARI:WEBKIT-STYLE
HTTP:STC:SAFARI:WEBKIT-1ST-LTR
HTTP:STC:SAFARI:IPHONE-LIBTIFF
HTTP:STC:SAFARI:JS-EVAL-DOS
HTTP:STC:SAFARI:FLOAT-BOF
HTTP:STC:SAFARI:KHTMLPARSER-BOF
HTTP:STC:SAFARI:ADDR-BOOK-INFO
HTTP:STC:SAFARI:WEBKIT-RANGEOBJ
HTTP:STC:SAFARI:WEBKIT-XSS
HTTP:STC:SAFARI:MAL-URI-DOS
HTTP:STC:SAFARI:WEBKIT-KHTMLDOS
HTTP:STC:SAFARI:DOC-LOCATION-BO
HTTP:STC:SAFARI:FEED-URI
HTTP:STC:SAFARI:WEBKIT-INFO-DIS
HTTP:STC:SAFARI:IPHONE-ALERT
HTTP:STC:SAFARI:TIMEOUT-SPOOF
HTTP:STC:SAFARI:IOS-JS-ARY-RCE
HTTP:STC:SAFARI:CSS-IMG-DOS
HTTP:STC:SAFARI:ENTITY-INFODISC
HTTP:STC:SAFARI:PARENT-CLOSE
HTTP:STC:SAFARI:XML-INFI-RECUR
HTTP:STC:SAFARI:CMD-INJECTION
HTTP:STC:SAFARI:CONSOLE-LOG-FS
HTTP:STC:SAFARI:WEBKIT-COLUMN
HTTP:STC:SAFARI:WEBKIT-RENDER
HTTP:STC:SAFARI:WEBKIT-AFREE
HTTP:STC:SAFARI:WEBKIT-MENU-MEM
HTTP:STC:SAFARI:RTL-USE-FREE
HTTP:STC:SAFARI:X-MAN-PAGE-RCE

HTTP:STC:SCRIPT

HTTP:STC:SCRIPT:REBOTS-DOT-PHP
HTTP:STC:SCRIPT:REPLACE-OBSF
HTTP:STC:SCRIPT:UNICODE-SLED
HTTP:STC:SCRIPT:SVL-DBL-FREE
HTTP:STC:SCRIPT:FUNC-REASSIGN
HTTP:STC:SCRIPT:OBFUSCATED
HTTP:STC:SCRIPT:HTML-SCRIPT
HTTP:STC:SCRIPT:NONALPHANUMERIC
HTTP:STC:SCRIPT:PAYLOAD-SETUP
HTTP:STC:SCRIPT:APACHE-XML-DOS
HTTP:STC:SCRIPT:COOKIE-BOMB
HTTP:STC:SCRIPT:HTML-OBFUS
HTTP:STC:SCRIPT:FROMCC-UNESCAPE
HTTP:STC:SCRIPT:PYTHON-RECVFROM
HTTP:STC:SCRIPT:JAVA-EVASION

HTTP:STC:SRVRSP

HTTP:STC:SRVRSP:COMPRESSED
HTTP:STC:SRVRSP:403-FORBID
HTTP:STC:SRVRSP:AUTH-RESP-OF
HTTP:STC:SRVRSP:404-NOT-FOUND
HTTP:STC:SRVRSP:IDC-PATH

HTTP:STC:SSL

HTTP:STC:SSL:MD5-SIGNATURE

HTTP:STC:STREAM

HTTP:STC:STREAM:FLV
HTTP:STC:STREAM:SWF
HTTP:STC:STREAM:CONTENT-TYPE
HTTP:STC:STREAM:WMV
HTTP:STC:STREAM:AVI
HTTP:STC:STREAM:DIRECTX-MJPEG
HTTP:STC:STREAM:FLASH-MEMORY
HTTP:STC:STREAM:QT-IT-MEM
HTTP:STC:STREAM:QT-MPEG-PAD
HTTP:STC:STREAM:QUICKTIME-BO
HTTP:STC:STREAM:DIRECTSHOW-MP3
HTTP:STC:STREAM:REAL-MP4-MEM
HTTP:STC:STREAM:MAL-AVI-RIFF
HTTP:STC:STREAM:FFDSHOW-URL-OF
HTTP:STC:STREAM:ASF-WMP
HTTP:STC:STREAM:QT-DESC-ATOM
HTTP:STC:STREAM:REALMEDIA-PROC
HTTP:STC:STREAM:MAL-MEDIA
HTTP:STC:STREAM:DIRECTSHOW-MJPG
HTTP:STC:STREAM:QT-M3U
HTTP:STC:STREAM:DIRSHOW-MJPEG
HTTP:STC:STREAM:QT-MOV-IO
HTTP:STC:STREAM:QT-RESPONSE-BO
HTTP:STC:STREAM:REAL-AVI
HTTP:STC:STREAM:WINAMP-META-OF
HTTP:STC:STREAM:QT-FLASHPIX-OF
HTTP:STC:STREAM:APPLE-QT-OBO-BO
HTTP:STC:STREAM:QT-FF
HTTP:STC:STREAM:QT-HREFTRACK
HTTP:STC:STREAM:REALAUDIO-OF
HTTP:STC:STREAM:REALPLAYER-MP3
HTTP:STC:STREAM:QT-MAL-SMIL
HTTP:STC:STREAM:VLC-REALINDEX
HTTP:STC:STREAM:CINEPAK-RCE
HTTP:STC:STREAM:REALPLAYER-QCP
HTTP:STC:STREAM:QT-MOV-FILE-BOF
HTTP:STC:STREAM:ASF-BOF
HTTP:STC:STREAM:GDI-WMF-HEADER

HTTP:STC:SWF

HTTP:STC:SWF:FLASH-MEM-CORRUPT
HTTP:STC:SWF:MAL-SWF-OF
HTTP:STC:SWF:DEFSCENE-OF
HTTP:STC:SWF:REAL-FLV
HTTP:STC:SWF:HEAP-OF
HTTP:STC:SWF:PHPEXEC
HTTP:STC:SWF:ACTIONTAG
HTTP:STC:SWF:CVE-2013-3362-MC
HTTP:STC:SWF:OPENTYPE-FONT-OF
HTTP:STC:SWF:RESOURCEMODULEURLS
HTTP:STC:SWF:UNDEF-NS
HTTP:STC:SWF:FLASH-SALIGN
HTTP:STC:SWF:TEXT-IOF
HTTP:STC:SWF:STAGE3D
HTTP:STC:SWF:AS-POOL
HTTP:STC:SWF:REC-S-OF
HTTP:STC:SWF:PLACEOBJX
HTTP:STC:SWF:SIZE-MIS
HTTP:STC:SWF:BYTEARRAY
HTTP:STC:SWF:FLASH-DEFINEFONT
HTTP:STC:SWF:URL-SEC-DOM-RCE
HTTP:STC:SWF:SWAVE-TSAC-CHUNK
HTTP:STC:SWF:KEY-PRESS-EVENT
HTTP:STC:SWF:COPYRAWDATATO
HTTP:STC:SWF:SHARED-OBJ-UAF
HTTP:STC:SWF:ADOBE-FLASH-FILEBO
HTTP:STC:SWF:HEADER-MEM-RCE
HTTP:STC:SWF:FLASHPLAYER-OF

HTTP:STC:VULN

HTTP:STC:VULN:APACHE-1-3-28
HTTP:STC:VULN:APACHE-1-3-26-31
HTTP:STC:VULN:APACHE-2-0-52
HTTP:STC:VULN:WEBLOGIC-8-1
HTTP:STC:VULN:IMAIL-8-13
HTTP:STC:VULN:CHEROKEE-0-4-17-1
HTTP:STC:VULN:OUTLOOK-XSRF
HTTP:STC:VULN:TAG-BDO
HTTP:STC:VULN:OSX-UPDATE

HTTP:STC:WINAMP

HTTP:STC:WINAMP:AU-OF1
HTTP:STC:WINAMP:ULTRAVOX-MSG
HTTP:STC:WINAMP:ID3V2-OVERFLOW
HTTP:STC:WINAMP:M3U-BOF
HTTP:STC:WINAMP:MAKI-SCRIPT-OF
HTTP:STC:WINAMP:MAKI-PARSE-OF
HTTP:STC:WINAMP:5.61-DOS
HTTP:STC:WINAMP:CDDA-OF3
HTTP:STC:WINAMP:CDDA-OF
HTTP:STC:WINAMP:MOD-HDR-OF

HTTP:STREAM

HTTP:STREAM:AAJTAK-STREAM
HTTP:STREAM:STARTV-STREAM
HTTP:STREAM:FLV
HTTP:STREAM:YOUTUBE-REQ
HTTP:STREAM:VIDEO-CONTENT
HTTP:STREAM:QUICKTIME-CLIENT
HTTP:STREAM:ITUNES-USERAGENT
HTTP:STREAM:GOOGLE-VIDEO
HTTP:STREAM:MAGIX-OF

HTTP:TOMCAT

HTTP:TOMCAT:REAL-PATH-DISC
HTTP:TOMCAT:JSP-PAGE
HTTP:TOMCAT:JSP-COMMENTS
HTTP:TOMCAT:JSP-BUFFER
HTTP:TOMCAT:REAL-PATH-REQ
HTTP:TOMCAT:JSP-AS-HTML
HTTP:TOMCAT:SERVLET-DEVICE-DOS
HTTP:TOMCAT:SOURCE-MAL-REQ
HTTP:TOMCAT:XPL-FILE-DISC
HTTP:TOMCAT:DIR-TRAV
HTTP:TOMCAT:DIR-LIST-INFO-DISCL
HTTP:TOMCAT:JSP-DEC-INT-OF
HTTP:TOMCAT:URL-ENC-DIRTRAV
HTTP:TOMCAT:FORM-AUTHENTICATION
HTTP:TOMCAT:TOMCAT-JSP-DISC
HTTP:TOMCAT:AWSTATS-CFG-EXEC
HTTP:TOMCAT:AJP12-SHUTDOWN
HTTP:TOMCAT:POLICY-BYPASS

HTTP:TUNNEL

HTTP:TUNNEL:REDUH
HTTP:TUNNEL:CHAT-YIM
HTTP:TUNNEL:CHAT-AOL-IM
HTTP:TUNNEL:ALTNET-OVER-HTTP
HTTP:TUNNEL:TELNET
HTTP:TUNNEL:PROXY
HTTP:TUNNEL:CHAT-MSN-IM-SSL
HTTP:TUNNEL:HTTPTUNNEL-URL
HTTP:TUNNEL:SIP
HTTP:TUNNEL:ANCHORFREE-CLIENT
HTTP:TUNNEL:SMTP
HTTP:TUNNEL:CHAT-MSN-IM

HTTP:UA

HTTP:UA:SKIPFISH
HTTP:UA:CURL
HTTP:UA:WGET
HTTP:UA:AUTO-EMAIL-PRO
HTTP:UA:PBROWSE
HTTP:UA:DSURF
HTTP:UA:EMAILSPIDER
HTTP:UA:NSAUDITOR
HTTP:UA:ATOMIC-EMAIL-HUNTER
HTTP:UA:EMAILWOLF-COLLECTOR
HTTP:UA:EXTRACTOR-PRO
HTTP:UA:EMAILSIPHON-COLLECTOR
HTTP:UA:CONTACTBOT-COLLECTOR
HTTP:UA:PHP-BASE64-DECODE
HTTP:UA:CRAZY-BROWSER
HTTP:UA:PHP-CODE-INJ

HTTP:UNIX-CMD

HTTP:UNIX-CMD:UNIX-CMD-M-Z
HTTP:UNIX-CMD:UNIX-CMD-A-L

HTTP:UNIX-FILE

HTTP:UNIX-FILE:ETC-HOSTS-ALLOW
HTTP:UNIX-FILE:ETC-PASSWD

HTTP:WASD

HTTP:WASD:CONF-ACCESS
HTTP:WASD:DIR-TRAV

HTTP:WEBLOGIC

HTTP:WEBLOGIC:URL-REVEAL-SRC
HTTP:WEBLOGIC:WEBROOT
HTTP:WEBLOGIC:ENCODING
HTTP:WEBLOGIC:BEAPACHE
HTTP:WEBLOGIC:JSESSIONID
HTTP:WEBLOGIC:BEA-CONN-BOF
HTTP:WEBLOGIC:CONSOLE-HELP-PORT

HTTP:WEBSPHERE

HTTP:WEBSPHERE:VER-DOS
HTTP:WEBSPHERE:SERVER-OF
HTTP:WEBSPHERE:APP-SERVER-REQ

HTTP:WEBSTER

HTTP:WEBSTER:DIR-TRAVERSAL
HTTP:WEBSTER:LONG-GET-REQ

HTTP:WHATSUP

HTTP:WHATSUP:WEB-SQL-INJECT
HTTP:WHATSUP:INSTANCENAME-OF
HTTP:WHATSUP:DOS-DEV-DOS

HTTP:WIN-CMD

HTTP:WIN-CMD:ROOT.EXE

HTTP:XSS

HTTP:XSS:SHAREPOINT-XSS
HTTP:XSS:MERCURY-BOARD
HTTP:XSS:IIS-ASP
HTTP:XSS:MAILMAN-ADMIN
HTTP:XSS:NASA-TRACE
HTTP:XSS:WEB-VIEW-DOC-SCR-INJ
HTTP:XSS:MS-FOREFRONT-INFO-DISC
HTTP:XSS:WHITE-LABEL-CMS
HTTP:XSS:SHAREPOINT-XSS-2
HTTP:XSS:WP-YT-AUDIO
HTTP:XSS:HTW-XSS
HTTP:XSS:APACHE-SSI-XSS
HTTP:XSS:ANWIKI-XSS
HTTP:XSS:JOOMLA-COM-RESMAN
HTTP:XSS:OUTLOOK-WEB-ACCESS
HTTP:XSS:CISCO-CSUSERCGIXSS
HTTP:XSS:TOMCAT-JSP
HTTP:XSS:CISCO-XSS
HTTP:XSS:COLDFUSION-MX7
HTTP:XSS:WP-ESHOP
HTTP:XSS:JAVA-COM-EXP
HTTP:XSS:ISA-AUTH-XSS
HTTP:XSS:PHPNUKE-BOOKMARKS
HTTP:XSS:APACHE-MOD-NEGOTIATION
HTTP:XSS:SERVICE-CGI
HTTP:XSS:HTML-SCRIPT-IN-URL-PTH
HTTP:XSS:ORACLE-GLASSFISH
HTTP:XSS:WP-INLINE-GALLERY
HTTP:XSS:WP-LIVE-WIRE-THEME
HTTP:XSS:AFTERLOGIC-WEBMAIL-PRO
HTTP:XSS:CISCO-SESM
HTTP:XSS:AWAUCTIONSCRIPT-CMS
HTTP:XSS:SHARE-XSS
HTTP:XSS:FRONTPAGE-EXT
HTTP:XSS:DRUPAL-CUMULAS
HTTP:XSS:WP-AJAX-CALENDAR
HTTP:XSS:WP-SOCIALGRID
HTTP:XSS:WP-UNIVERSAL-POST
HTTP:XSS:MS-IE-TOSTATICHTML
HTTP:XSS:WP-PLACESTER
HTTP:XSS:WP-GAZETTE-THEME
HTTP:XSS:PACER-EDITION-EMAIL
HTTP:XSS:LDAP-ACCOUNT-MGR
HTTP:XSS:IPLANET-ROOT
HTTP:XSS:WP-WOOTHEMES
HTTP:XSS:E2-PHOTO-GALLERY
HTTP:XSS:MAILMAN-OPTIONS
HTTP:XSS:JOOMLA-CITY
HTTP:XSS:MS-FOREFRONT-EXCEL-TBL
HTTP:XSS:US-ROBOTICS-FIRMWARE
HTTP:XSS:ROBOHELP-XSS
HTTP:XSS:WP-AJAX-CATEGORY
HTTP:XSS:SUBRION-CMS
HTTP:XSS:CISCOWORKS-CSFHS-1
HTTP:XSS:WP-AJAX-RECENT-POSTS
HTTP:XSS:IBM-OPEN-ADMIN
HTTP:XSS:VBULLETIN-SORT
HTTP:XSS:CISCO-CSDC
HTTP:XSS:XOOPS-MULT
HTTP:XSS:OMNIHTTPD-REDIR
HTTP:XSS:MS-W3WHO-XSS
HTTP:XSS:MS-VSTWAC-TFS
HTTP:XSS:SYNDEO-CMS-ADDONS
HTTP:XSS:ZEN-CART
HTTP:XSS:VBULLETIN-SORTORDER
HTTP:XSS:TM-REQUEST-FORGERY
HTTP:XSS:INMAGIC-DBTWPUB
HTTP:XSS:WP-ZOTPRESS
HTTP:XSS:MS-SCOM-WEB-CONSOLE
HTTP:XSS:MS-SCCM-REFLECTED
HTTP:XSS:PHPWEBSITE-PAGE-ID
HTTP:XSS:SHAREPOINT-EDITFORM
HTTP:XSS:SHAREPOINT-INPLVIEW
HTTP:XSS:MC-CONTENT-MANAGER
HTTP:XSS:WP-RATING-WIDGET
HTTP:XSS:XOOPS-VIEW-PHOTOS-PHP
HTTP:XSS:SYMANTEC-WG
HTTP:XSS:SHAREPOINT-WIZARDLIST
HTTP:XSS:SHAREPOINT-LIST-XSS
HTTP:XSS:WP-IGIT-POSTS
HTTP:XSS:ATUTOR-ACONTENT
HTTP:XSS:SYM-IM-MANAGER
HTTP:XSS:WP-DAILY-MAUI-PHOTO
HTTP:XSS:WP-PHOTORACER
HTTP:XSS:WP-COMICPRESS
HTTP:XSS:CMSQLITE-ID
HTTP:XSS:WP-PHOTO-ALBUM
HTTP:XSS:ORACLE-RAPID-WEBSRV
HTTP:XSS:WP-STATS-DASHBOARD
HTTP:XSS:AXIS-M10-CAMERA
HTTP:XSS:WP-SERMON-BROWSER
HTTP:XSS:SHAREPOINT-THEMEWEB
HTTP:XSS:BEA-ADMIN-CONSOLE
HTTP:XSS:MUL-RECORDPRESS
HTTP:XSS:HTML-SCRIPT-IN-HOST
HTTP:XSS:URL-IMG-XSS
HTTP:XSS:IE7-XSS
HTTP:XSS:MS-REPORT-VIEWER
HTTP:XSS:SHAREPOINT-CALLBACK
HTTP:XSS:HTML-SCRIPT-IN-UA
HTTP:XSS:HTML-HTW
HTTP:XSS:ORACLE-BIEE-XSS
HTTP:XSS:NAGIOS-XI-ALERT-CLOUD
HTTP:XSS:NOVELL-QUICKFINDER
HTTP:XSS:JAVA-IDENTITY-MGR
HTTP:XSS:LINKSYS-WIRELESS
HTTP:XSS:MS-OUTLOOK-REDIR-ASP
HTTP:XSS:TECHSMITH-SWF
HTTP:XSS:HTML-SCRIPT-IN-AL
HTTP:XSS:HTML-SCRIPT-IN-AE
HTTP:XSS:IE-DHTML-EDIT
HTTP:XSS:ASP-REQ-VALIDATION
HTTP:XSS:MS-FOREFRONT-DEFAULT
HTTP:XSS:CPANEL-MODULES
HTTP:XSS:WP-LOCAL-MARKET-EXP
HTTP:XSS:CISCOWORKS-CSFHS
HTTP:XSS:MS-SHAREPOINT-PARAM
HTTP:XSS:WP-LAZYEST-GALLERY
HTTP:XSS:WP-PHOTOSMASH-GAL
HTTP:XSS:REALPLAYER-SMIL
HTTP:XSS:CPANEL-FILEOP
HTTP:XSS:HP-SEARCH-XSS
HTTP:XSS:X-FORWARDED-FOR-INJ
HTTP:XSS:SUSPICIOUS-SCAN
HTTP:XSS:HTML-SCRIPT-IN-COOKIE
HTTP:XSS:HDR-REFERRER
HTTP:XSS:HTML-SCRIPT-IN-POST
HTTP:XSS:DYNAMICAX-PORTAL-XSS
HTTP:XSS:FOREFRONT-SIGNURL
HTTP:XSS:OUTLOOK-WEB
HTTP:XSS:MS-CS
HTTP:XSS:MS-REPORT-MANAGER
HTTP:XSS:SHAREPOINT-COMMAND
HTTP:XSS:SHAREPOINT-USER
HTTP:XSS:HTML-SCRIPT-IN-URL-VAR
HTTP:XSS:ORACLE-REPORT-SVR

HTTP:YAHOO

HTTP:YAHOO:ATTACHMENT-UPLOAD
HTTP:YAHOO:ACTIVITY
HTTP:YAHOO:ATTACHMENT-DOWNLOAD

ICMP

ICMP:MODEMS-ATH-COMMAND-DOS

ICMP:AUDIT

ICMP:AUDIT:RESPONSE-RESND
ICMP:AUDIT:INVALID-CODE
ICMP:AUDIT:WRONG-CHECKSUM
ICMP:AUDIT:REQUEST-RESND
ICMP:AUDIT:INVALID-TYPE
ICMP:AUDIT:RESP-WITHOUT-REQ
ICMP:AUDIT:ICMP-WITH-OPTIONS

ICMP:EXPLOIT

ICMP:EXPLOIT:FLOOD
ICMP:EXPLOIT:DIFF-CSUM-IN-RESP
ICMP:EXPLOIT:DIFF-LEN-IN-RESND
ICMP:EXPLOIT:NON-ZERO-DATA-LEN
ICMP:EXPLOIT:DIFF-LEN-IN-RESP
ICMP:EXPLOIT:LAN-SMURF
ICMP:EXPLOIT:DIFF-CSUM-IN-RESND
ICMP:EXPLOIT:MIP-ROUTE-OF
ICMP:EXPLOIT:ECHOK

ICMP:INFO

ICMP:INFO:INFORMATION
ICMP:INFO:TIMESTAMP
ICMP:INFO:ADDR-REQ
ICMP:INFO:ECHO-REPLY
ICMP:INFO:ECHO-REQUEST

IDENT

IDENT:GEWSE-FLOOD
IDENT:TINYIDENT-OF

IDENT:AUDIT

IDENT:AUDIT:RESPONSE
IDENT:AUDIT:NEST-REQ
IDENT:AUDIT:PORT-PAIR

IDENT:INVALID

IDENT:INVALID:EOL
IDENT:INVALID:EMPTY-LN
IDENT:INVALID:SENDMAIL-EXPL

IDENT:JIDENTD

IDENT:JIDENTD:IDENT-OF1

IDENT:OVERFLOW

IDENT:OVERFLOW:REPLY
IDENT:OVERFLOW:REQUEST
IDENT:OVERFLOW:REQUEST-NUM

IKE

IKE:FW1-OVERFLOW
IKE:INV-DER-LEN
IKE:KAME-RACOON-X509-CERT-VERIF
IKE:OPENSWAN-DPD-NULL-PTR-DOS
IKE:STRONGSWAN-CERTIFICATE-BO
IKE:SYMANTEC-ISAKMPD-DOS

IKE:DOS

IKE:DOS:CISCO-DOS
IKE:DOS:TCPDUMP-ID-UNDERFLOW
IKE:DOS:TCPDUMP-SPI-OVERFLOW
IKE:DOS:TCP-HUMP
IKE:DOS:WIN2K-DOS
IKE:DOS:ISAKMP-DOS-IPSEC
IKE:DOS:ISAKMP-DOS
IKE:DOS:OPENBSD-ISAKMPD

IKE:MALFORMED

IKE:MALFORMED:2MANY-PAYLOAD
IKE:MALFORMED:PACKET
IKE:MALFORMED:INV-PAYLOAD-TYPE
IKE:MALFORMED:INV-PAY-LEN

IMAP

IMAP:SET-QUOTA
IMAP:MER-SUBSCRIBE
IMAP:LOTUS-CRAM
IMAP:AUTH-OF

IMAP:AUDIT

IMAP:AUDIT:LOGIN-FAILED
IMAP:AUDIT:REQ-INVALID-STATE
IMAP:AUDIT:REQ-UNKNOWN-CMD
IMAP:AUDIT:COMMAND-FAILED
IMAP:AUDIT:REQ-BINARY-DATA
IMAP:AUDIT:IMAPS-CLEAR

IMAP:CYRUS

IMAP:CYRUS:PRELOG
IMAP:CYRUS:FETCH-CMD
IMAP:CYRUS:PARTIAL-CMD
IMAP:CYRUS:LOGIN-OF

IMAP:EXPLOIT

IMAP:EXPLOIT:NETMAIL-APPEND
IMAP:EXPLOIT:CMD-DIR-TRSVR
IMAP:EXPLOIT:SUSPICIOUS-HEADER
IMAP:EXPLOIT:CMD-FORMAT-STRING

IMAP:FAILURE

IMAP:FAILURE:BRUTE-FORCE

IMAP:IPSWITCH

IMAP:IPSWITCH:FETCH-OF
IMAP:IPSWITCH:IMAIL-INFO
IMAP:IPSWITCH:DELETE-OF
IMAP:IPSWITCH:STATUS-OF
IMAP:IPSWITCH:SEARCH-DATE
IMAP:IPSWITCH:CHAR-OF

IMAP:OVERFLOW

IMAP:OVERFLOW:REFERENCE
IMAP:OVERFLOW:PASS
IMAP:OVERFLOW:FLAG
IMAP:OVERFLOW:COMMAND
IMAP:OVERFLOW:USER
IMAP:OVERFLOW:MAILBOX
IMAP:OVERFLOW:LIT_LENGTH_OFLOW
IMAP:OVERFLOW:LINE
IMAP:OVERFLOW:TAG
IMAP:OVERFLOW:MAILENABLE-OF-3
IMAP:OVERFLOW:MDAEMON-MD5
IMAP:OVERFLOW:LINUX-X86-4
IMAP:OVERFLOW:LINUX-X86-5
IMAP:OVERFLOW:LINUX-X86-3
IMAP:OVERFLOW:LINUX-X86-2
IMAP:OVERFLOW:IMAP4-LSUB-OF
IMAP:OVERFLOW:WUIMAPD-MBOX-OF
IMAP:OVERFLOW:MERCURY-LOGIN
IMAP:OVERFLOW:LINUX-X86-1
IMAP:OVERFLOW:MERCUR-NTLMSSP
IMAP:OVERFLOW:SCO-IMAPD-UNO-OF
IMAP:OVERFLOW:MAILENABLE-ARG-OF
IMAP:OVERFLOW:WUIMAPD-PART-OF
IMAP:OVERFLOW:MAILENABLE-OF-2
IMAP:OVERFLOW:BIN-SH
IMAP:OVERFLOW:LITERAL-TOKEN
IMAP:OVERFLOW:LIST-OF
IMAP:OVERFLOW:MAILENABLE-OF
IMAP:OVERFLOW:MAILENABLE-APPEND
IMAP:OVERFLOW:IMAP-LSUB-OF
IMAP:OVERFLOW:MERCURY-MAIL-BO
IMAP:OVERFLOW:MAILENABLE-BO
IMAP:OVERFLOW:DOMINO-IMAP
IMAP:OVERFLOW:IMAP-CONT-OF
IMAP:OVERFLOW:OL-IFRAME-EXEC

IMAP:REQERR

IMAP:REQERR:REQ-DUPLICATE-TAG
IMAP:REQERR:REQ-INVALID-TAG
IMAP:REQERR:REQ-UNEXPECTED-ARG
IMAP:REQERR:INVALID_LITERAL_LEN
IMAP:REQERR:EMPTY-COMMAND

IMAP:VULN

IMAP:VULN:CYRUS-2-1-11

IP

IP:ESP-RUNT
IP:SRC-ROUTE-OF
IP:IGMP-MS-DOS

IP:AUDIT

IP:AUDIT:HAS-IP-OPTIONS
IP:AUDIT:INVALID-TYPE

IP:EXPLOIT

IP:EXPLOIT:IP-TRACEROUTE
IP:EXPLOIT:SAME-SRC-DST

IP:INFO

IP:INFO:INVALID-DESTINATION
IP:INFO:INVALID-SOURCE

IP:OPTERR

IP:OPTERR:DUPLICATE
IP:OPTERR:INVALID-LENGTH
IP:OPTERR:INVALID-INFRAGMENT

IP:OVERFLOW

IP:OVERFLOW:OPTIONS

LDAP

LDAP:UNSUPPORTED_VERSION
LDAP:CONTROLS-MISMATCH
LDAP:IMAIL-BOF
LDAP:BER-DOS
LDAP:SUN-DIR-OF
LDAP:SIDVAULT-DOS
LDAP:LOTUS-DOMINO
LDAP:KERIO-DOS
LDAP:LSASS-HEAP-OF
LDAP:OPENLDAP-2.2.23-DOS
LDAP:COMMGATE-OF
LDAP:TIVOLI-OF
LDAP:AD-LDAP-DOS
LDAP:AD-CONVERT-ATT
LDAP:SUN-REQ-FS
LDAP:EDIRECTORY-DOS
LDAP:NA-PGP-KEYSERVER-OF
LDAP:LOTUS-DN
LDAP:ORACLE-PREAUTH-DOS
LDAP:AD-AUTH-BYPASS
LDAP:MS-AD-QUERY-DOS
LDAP:MS-WINDOWS-AD-LDAP-DOS
LDAP:OPENLDAP-RWM-DOS
LDAP:RECURSIVE-DOS

LDAP:AUDIT

LDAP:AUDIT:ANONYMOUS_BIND
LDAP:AUDIT:BIND_RESULT_FAILED

LDAP:EMPTY

LDAP:EMPTY:EXTDRSP-RSPNM-EMPTY
LDAP:EMPTY:EXTDREQ-REQVAL-EMPTY
LDAP:EMPTY:EXTDRSP-RESP-EMPTY
LDAP:EMPTY:EXTDREQ-REQNM-EMPTY
LDAP:EMPTY:SRCHREQ_FTR_NULL
LDAP:EMPTY:SRCHREQ_FTR_SSTR
LDAP:EMPTY:SCHREQ-FTR-SSTR-NONE
LDAP:EMPTY:ATTRIB_ASSERT_EMPTY
LDAP:EMPTY:ATTRIBLIST_EMPTY
LDAP:EMPTY:ATTRIBDESC_EMPTY
LDAP:EMPTY:ASSERT_EMPTY
LDAP:EMPTY:ATTRIBVALUE_EMPTY
LDAP:EMPTY:REFERRAL_EMPTY
LDAP:EMPTY:SRCH_RES_OBJ_EMPTY
LDAP:EMPTY:SRCH_FILTER_EMPTY
LDAP:EMPTY:SRCHREQ_FILTER_EMPTY
LDAP:EMPTY:MODIFYREQ_ADD_EMPTY
LDAP:EMPTY:SRCH_RESREF_NONE
LDAP:EMPTY:DELREQ_EMPTY
LDAP:EMPTY:MODIFYREQ_EMPTY
LDAP:EMPTY:ADDREQ-ATTRIB-EMPTY
LDAP:EMPTY:ATTRIBVAL_LIST_EMPTY
LDAP:EMPTY:SRCHREQ_LOGOP_NOARGS
LDAP:EMPTY:SCHREQ_FILTER_EMPTY
LDAP:EMPTY:MODREQ-ATTRIB-EMPTY
LDAP:EMPTY:MODIFYREQ_PART_EMPTY

LDAP:FAILED

LDAP:FAILED:ADD-RESULT-FAIL
LDAP:FAILED:MODIFY-RESULT-FAIL
LDAP:FAILED:COMPARE_RESULT_FAIL
LDAP:FAILED:DELETE-RESULT-FAIL
LDAP:FAILED:SEARCH-RESULT-FAIL
LDAP:FAILED:BRUTE-FORCE
LDAP:FAILED:MODDN-RESULT-FAIL

LDAP:FORMAT

LDAP:FORMAT:ENC_LEN_LEFT_ZEROS
LDAP:FORMAT:ENC_INCORRECT_TAG
LDAP:FORMAT:ENC_LEN_INDEFINITE
LDAP:FORMAT:ENC-UNK-END-CHAR
LDAP:FORMAT:DN_FMTERR
LDAP:FORMAT:ATTRIB-DESC-FMTERR

LDAP:INVALID

LDAP:INVALID:MODDNREQ-ENTRY-INV
LDAP:INVALID:MESGID-INVALID
LDAP:INVALID:SEARCH-FILTER-INV
LDAP:INVALID:SRCHREQ_FLEN_INV
LDAP:INVALID:ENTRY_INVALID
LDAP:INVALID:ATTRIBTYPE_INVALID
LDAP:INVALID:ADDREQ-ENTRY-INV
LDAP:INVALID:REQ-ATTRIBTYPE-INV
LDAP:INVALID:REQ-OPERATION-INV
LDAP:INVALID:SRCH_RES_ATTR_INV
LDAP:INVALID:REFERRAL_INVALID
LDAP:INVALID:SEARCH-ATTRIB-INV
LDAP:INVALID:SRCH-TYPEONLY-INV
LDAP:INVALID:SRCH-TIMELIMIT-INV
LDAP:INVALID:SRCH-SIZELIMIT-INV
LDAP:INVALID:SEARCH-BASEOBJ-INV
LDAP:INVALID:SRCH-DEREF-AL-INV
LDAP:INVALID:REQTYPE_INVALID
LDAP:INVALID:SEARCH_SCOPE_INV
LDAP:INVALID:ENC_INVALID_LEN
LDAP:INVALID:ENC_BOOLEAN
LDAP:INVALID:MODDNREQ-NWRDN-INV
LDAP:INVALID:ENC_INTEGER_LEN
LDAP:INVALID:REQ_OBJECT_INVALID
LDAP:INVALID:MODRDN-NULL-RDN

LDAP:OVERFLOW

LDAP:OVERFLOW:ENCODING-TAG-OF
LDAP:OVERFLOW:ENC_REPR_2LONG
LDAP:OVERFLOW:ENCODING-LEN-OF
LDAP:OVERFLOW:DN_TOO_LONG
LDAP:OVERFLOW:SEARCH-LEVELS-OF
LDAP:OVERFLOW:ATTRIB-DESC-OF
LDAP:OVERFLOW:ENCODING-INT-OF
LDAP:OVERFLOW:ENC-TAG-VAL-OF
LDAP:OVERFLOW:MESSAGE-TOO-LONG
LDAP:OVERFLOW:REQ-OF
LDAP:OVERFLOW:DC-MEM-LEAK-DOS
LDAP:OVERFLOW:MS-DIR-LEAK-MC
LDAP:OVERFLOW:IMAIL-ASN-1
LDAP:OVERFLOW:MODRDN-UTF8-EXEC

LPD

LPD:HUMMINGBIRD
LPD:ACTFAX-SERVER-BO
LPD:MSF-CASCADE-JOB-REQ
LPD:LDP-CMD-INJ
LPD:OPT-OF

LPR

LPR:HP-UX-CMD
LPR:ARB-FILE-UNLINK
LPR:WINDOWS-LPR-DOS
LPR:SAP-GUI-SAPLPD-DOS

LPR:AUDIT

LPR:AUDIT:CMD-FAILED
LPR:AUDIT:PORT
LPR:AUDIT:RESPONSE
LPR:AUDIT:CMD
LPR:AUDIT:C-CMD

LPR:INVALID

LPR:INVALID:C-NAME
LPR:INVALID:C-EMPTY
LPR:INVALID:D-EMPTY
LPR:INVALID:REQUEST
LPR:INVALID:EOL
LPR:INVALID:LINE
LPR:INVALID:D-NAME
LPR:INVALID:EOF
LPR:INVALID:CMD-TRUNC

LPR:OVERFLOW

LPR:OVERFLOW:C-NAME
LPR:OVERFLOW:C-WIDTH
LPR:OVERFLOW:CFILE-LEN
LPR:OVERFLOW:C-TITLE
LPR:OVERFLOW:CFILE
LPR:OVERFLOW:C-MAIL
LPR:OVERFLOW:C-BANNER
LPR:OVERFLOW:C-HOST
LPR:OVERFLOW:C-CLASS
LPR:OVERFLOW:C-JOB
LPR:OVERFLOW:C-FORMAT
LPR:OVERFLOW:C-LENGTH
LPR:OVERFLOW:C-INDENT
LPR:OVERFLOW:C-FONT
LPR:OVERFLOW:D-LENGTH
LPR:OVERFLOW:DFILE
LPR:OVERFLOW:D-NAME
LPR:OVERFLOW:C-USER
LPR:OVERFLOW:LINE
LPR:OVERFLOW:C-SYMLINK
LPR:OVERFLOW:C-SOURCE
LPR:OVERFLOW:LPD-EXPLOIT

MISC

MISC:WINS-BOF
MISC:WINS-COMMENDLG
MISC:HTRAN-PROXY-CONNECT-FAILED
MISC:KERIO-AUTH-OF
MISC:LLMNR-REVERSE-LOOKUP
MISC:LINUX-KERNEL-ISCSI-BO

MISC:PDF

MISC:PDF:INTEGER-OVERFLOW

MS-RPC

MS-RPC:MSRPC-ISYSACTIVATE-RACE
MS-RPC:EPDUMP-SCAN-2
MS-RPC:EPDUMP-SCAN
MS-RPC:ATSVC-RUNDLL
MS-RPC:EXCHANGE-MEM
MS-RPC:WRKST-DOS
MS-RPC:NOOP-SLIDE-RPC-REQ
MS-RPC:SAMR-ACCESS-REQUEST
MS-RPC:SAMR-ACCESS-DENIED
MS-RPC:INDX-SVC-ACTIVE
MS-RPC:MSDTC-DOS
MS-RPC:ATSVC-BIND
MS-RPC:DCERPC-DOS3
MS-RPC:TREND-MICRO-RPC
MS-RPC:PGP-SRV-PTR
MS-RPC:NETSRVRDSKENUM
MS-RPC:LAN-WORM-SPREAD
MS-RPC:MSGQU-FRNAME
MS-RPC:NETRLOGONGETDMNINF-NULL
MS-RPC:SPOOLER-DLL-LOAD
MS-RPC:BROADWIN-BOF
MS-RPC:MESSENGER-POPUP
MS-RPC:LLSSRV-RCE
MS-RPC:MSRPC-HIGRCE
MS-RPC:DCERPC-DOS
MS-RPC:DCE-RPC-UUID-BIND
MS-RPC:NTLM-RPCSS-DOS
MS-RPC:DCE-RPC-DNSSVR
MS-RPC:MAL-DNS
MS-RPC:SNORT-EVAL-BOF
MS-RPC:ARNUDP-RPC-DOS

MS-RPC:DCOM

MS-RPC:DCOM:SVRNAME-2LONG
MS-RPC:DCOM:REMACT-UDP
MS-RPC:DCOM:REMACT-OBJNAME-OF
MS-RPC:DCOM:REMACT
MS-RPC:DCOM:LONG-FILE-OF
MS-RPC:DCOM:EXPLOIT-2
MS-RPC:DCOM:EXPLOIT-3
MS-RPC:DCOM:EXPLOIT

MS-RPC:ERR

MS-RPC:ERR:INV-AUTH-LEN
MS-RPC:ERR:FRAG-BIGGER-THAN-NEG
MS-RPC:ERR:RESPONSE-NO-REQ
MS-RPC:ERR:FRAG-LEN-TOO-BIG
MS-RPC:ERR:CL-PAYLOAD-NOT-EMPTY
MS-RPC:ERR:EPM-INV-NUM-ENTRIES
MS-RPC:ERR:CO-PTYPE-IN-CL-PDU
MS-RPC:ERR:EPM-INV-TOWER-LEN
MS-RPC:ERR:EPM-INV-LHS-LEN
MS-RPC:ERR:EPM-WRONG-LHS-LEN
MS-RPC:ERR:EPM-INV-OP-NUM
MS-RPC:ERR:EPM-WRONG-TOWER-LEN
MS-RPC:ERR:CL-PTYPE-IN-CO-PDU
MS-RPC:ERR:COUNT-TOO-LARGE
MS-RPC:ERR:EPM-INV-RHS-LEN
MS-RPC:ERR:EPM-WRONG-RHS-LEN
MS-RPC:ERR:INV-PTYPE
MS-RPC:ERR:WRONG-FRAG
MS-RPC:ERR:LEN-CONFLICT
MS-RPC:ERR:INV-AUTH-PAD-LEN
MS-RPC:ERR:SHORT-MSG
MS-RPC:ERR:FRAG-LEN-TOO-SMALL

MS-RPC:EVASION

MS-RPC:EVASION:DCE-LARGE-FRAG-2
MS-RPC:EVASION:FRAG2-SMALL
MS-RPC:EVASION:BLIND-BIND-ACK2
MS-RPC:EVASION:DCERPC-SMALL-REQ
MS-RPC:EVASION:BUFFERED-REQ
MS-RPC:EVASION:LARGE-FRAG-2
MS-RPC:EVASION:BUFFERED-REQUEST
MS-RPC:EVASION:BLIND-BIND-ACK-2
MS-RPC:EVASION:SMALL-REQ-FRAG
MS-RPC:EVASION:LARGE-FRAG-1
MS-RPC:EVASION:MULTI-HEADER-1
MS-RPC:EVASION:SMALL-FRAG

MS-RPC:INV

MS-RPC:INV:REQUEST-FROM-SERVER
MS-RPC:INV:RESPONSE-FROM-CLIENT
MS-RPC:INV:SPOOLSS-SVC
MS-RPC:INV:NETDDE-SVC
MS-RPC:INV:NETWARE-SVC
MS-RPC:INV:LLSSRV-SVC
MS-RPC:INV:WKSTA-SVC
MS-RPC:INV:DNS-SVC
MS-RPC:INV:DCOM-SVC
MS-RPC:INV:PNP-SVC
MS-RPC:INV:SRV-SVC
MS-RPC:INV:MQ-SVC
MS-RPC:INV:RRAS-SVC

MS-RPC:LSASS

MS-RPC:LSASS:NETWARE-CIFS-OF
MS-RPC:LSASS:MAL-OPCODE
MS-RPC:LSASS:LSA-DOS-CHALLENGE
MS-RPC:LSASS:NTLM-DOS
MS-RPC:LSASS:OVERSIZED-FRAG
MS-RPC:LSASS:MAL-OPCODE-2

MS-RPC:OF

MS-RPC:OF:WKST-SVC-PIPE
MS-RPC:OF:MSG-QUEUE-1
MS-RPC:OF:RRAS
MS-RPC:OF:MS-DNS-RPC
MS-RPC:OF:NWSPOOL-OF
MS-RPC:OF:MSG-QUEUE-2
MS-RPC:OF:MESSENGER-1
MS-RPC:OF:MQSVC
MS-RPC:OF:WEBCLIENT
MS-RPC:OF:SPOOLSS-1
MS-RPC:OF:WKST-SVC
MS-RPC:OF:NETDDE-SHARE
MS-RPC:OF:SPOOLSS-3
MS-RPC:OF:SRV-SVC-1
MS-RPC:OF:MSG-QUEUE-3
MS-RPC:OF:MSDTC
MS-RPC:OF:SRV-SVC-2
MS-RPC:OF:LOC-SVC-2
MS-RPC:OF:LOC-SVC-1

NDMP

NDMP:SHORT-MSG

NETBIOS:ACCESS

NETBIOS:ACCESS:IPC-1
NETBIOS:ACCESS:SAMBA-CLIENT
NETBIOS:ACCESS:D-DRIVE
NETBIOS:ACCESS:C-DRIVE
NETBIOS:ACCESS:ADMIN

NETBIOS:AUDIT

NETBIOS:AUDIT:ACTIVE_ERR
NETBIOS:AUDIT:INV_HDR
NETBIOS:AUDIT:NAME_ERROR
NETBIOS:AUDIT:NBNAME-RES-ADDR

NETBIOS:DIR

NETBIOS:DIR:CD-DOTDOTDOT
NETBIOS:DIR:CD-DOTDOT

NETBIOS:DOS

NETBIOS:DOS:RFPOISON
NETBIOS:DOS:RFPARALYZE

NETBIOS:NBDS

NETBIOS:NBDS:EMPTY_UDP_MSG
NETBIOS:NBDS:SHORT_MSG
NETBIOS:NBDS:FRAG_TRANS_RESP
NETBIOS:NBDS:BAD_LABEL_FORMAT
NETBIOS:NBDS:MS-PRINT-SPOOL-FMT
NETBIOS:NBDS:MS-BROWSER-ELECT
NETBIOS:NBDS:BE-SERVERNAME-OF

NETBIOS:NBDS:INVALID

NETBIOS:NBDS:INVALID:MSG_TYPE
NETBIOS:NBDS:INVALID:LABEL_LEN
NETBIOS:NBDS:INVALID:1STLVL_ENC
NETBIOS:NBDS:INVALID:DGM_LEN
NETBIOS:NBDS:INVALID:HDR_FLGS
NETBIOS:NBDS:INVALID:PROTO

NETBIOS:NBDS:OF

NETBIOS:NBDS:OF:NAME
NETBIOS:NBDS:OF:MSG

NETBIOS:NBNS

NETBIOS:NBNS:CLASS-UNKNOWN
NETBIOS:NBNS:C2S_RESPONSE
NETBIOS:NBNS:NAME_TOO_LONG
NETBIOS:NBNS:C2S_AA_FLAG
NETBIOS:NBNS:TYPE_UNKNOWN
NETBIOS:NBNS:S2C_QUERY
NETBIOS:NBNS:SHORT_MSG
NETBIOS:NBNS:POINTER_LOOP
NETBIOS:NBNS:EMPTY-UDP-MSG

NETBIOS:NBNS:INVALID

NETBIOS:NBNS:INVALID:RRNB-FLG
NETBIOS:NBNS:INVALID:NAME-FLGS
NETBIOS:NBNS:INVALID:HDR-OPCODE
NETBIOS:NBNS:INVALID:PTR
NETBIOS:NBNS:INVALID:FIRST-ENC
NETBIOS:NBNS:INVALID:HDR-Z
NETBIOS:NBNS:INVALID:LABEL-LEN
NETBIOS:NBNS:INVALID:HDR-CNT

NETBIOS:NBNS:RESCODE

NETBIOS:NBNS:RESCODE:FORMAT_ERR
NETBIOS:NBNS:RESCODE:CONFLICT
NETBIOS:NBNS:RESCODE:SVR_FAIL
NETBIOS:NBNS:RESCODE:REFUSED
NETBIOS:NBNS:RESCODE:NOT_IMPLTD

NETBIOS:OVERFLOW

NETBIOS:OVERFLOW:MAILSLOT
NETBIOS:OVERFLOW:LENGTH-OF
NETBIOS:OVERFLOW:ASN-1-BER
NETBIOS:OVERFLOW:ASN-1-DER-OF

NETBIOS:WINS

NETBIOS:WINS:WPADWINS
NETBIOS:WINS:REPLICATION-PTR-U
NETBIOS:WINS:SRV-NAME-OF
NETBIOS:WINS:REPLICATION-PTR
NETBIOS:WINS:UPDATE-OF

NFS

NFS:CAP-MKNOD
NFS:BSD-MOUNT-DOS
NFS:UTILS-TCP-CONN-DOS
NFS:MS-WINDOWS-NFS-NULL-DOS
NFS:FREEBSD-REDDIR-MEM-COR
NFS:TRIPWIRE-FORMAT-STRING

NFS:AUDIT

NFS:AUDIT:UNKNOWN-VER
NFS:AUDIT:INVALID-XID
NFS:AUDIT:ROOT-ACCESS
NFS:AUDIT:MKNOD
NFS:AUDIT:REQ-DENIED

NFS:ERR

NFS:ERR:LONG-FILENAME
NFS:ERR:LARGE-FH
NFS:ERR:LARGE-CRED
NFS:ERR:VERSION-MISMATCH
NFS:ERR:LONG-NETNAME
NFS:ERR:SHORT-READ
NFS:ERR:WRONG-DIR
NFS:ERR:LONG-PATHNAME

NFS:INFO

NFS:INFO:UNKNOWN-PROG

NFS:INVALID

NFS:INVALID:INVALID-DIR
NFS:INVALID:INVALID-PROC
NFS:INVALID:INVALID-FILETYPE
NFS:INVALID:INVALID-RSTAT
NFS:INVALID:INVALID-AMASK
NFS:INVALID:INVALID-HOW
NFS:INVALID:BAD-CRED-LEN
NFS:INVALID:INVALID-CMODE
NFS:INVALID:BAD-VERF-CRED
NFS:INVALID:INVALID-EOF

NFS:OVERFLOW

NFS:OVERFLOW:BUF-OVERFLOW
NFS:OVERFLOW:XLOG-1BYTE-OF
NFS:OVERFLOW:LINUX-ACL-OF-DOS

NNTP

NNTP:INTERNETNEWS-NULL-PATH-DOS

NNTP:AUDIT

NNTP:AUDIT:NESTED-REPLY
NNTP:AUDIT:NESTED-REQ
NNTP:AUDIT:UNKNOWN-CMD

NNTP:ERR

NNTP:ERR:INVALID-CMD

NNTP:INN

NNTP:INN:INND-OF2
NNTP:INN:INND-OF1

NNTP:NN

NNTP:NN:NN-FMTSTR1

NNTP:OVERFLOW

NNTP:OVERFLOW:LINE-OVERFLOW
NNTP:OVERFLOW:OUTLOOK-NNTP-OF
NNTP:OVERFLOW:NNTP-XHDR
NNTP:OVERFLOW:XPAT-PATTERN
NNTP:OVERFLOW:INN-CONTROL-MSG

NNTP:VULN

NNTP:VULN:ISC-2-2-2

NTP

NTP:EXCEEDED_REF_CLKAGE
NTP:CTL_ERR_RSP_SEEN
NTP:RECVD_UNEXPECTED_PKT
NTP:PEER_MODE_INCOMPAT
NTP:PEER_STRATUM_INCOMPATI
NTP:PASV_NOT_DISSOLVED
NTP:MODE_STRATUM_ALTERED
NTP:NTP-READVAR
NTP:TRAFFIC
NTP:MUL-NTP-DAEMON-AUTOKEY-BOF
NTP:MODE7-DOS
NTP:MONLIST-REQUEST
NTP:MONLIST-REQUEST-FLOOD

NTP:ERROR

NTP:ERROR:CTL_INV_PEER_EVCODE
NTP:ERROR:INVALID_MODE
NTP:ERROR:DATA_FIELD_TOO_SHORT
NTP:ERROR:MAX_STRATUM_EXCEEDED
NTP:ERROR:CTL_INV_PEER_SELECT
NTP:ERROR:CTL_INV_PEER_STATUS
NTP:ERROR:CTL_VAR_NAME_2LONG
NTP:ERROR:CTL_INV_CLKSTATUS
NTP:ERROR:CTL_INVALID_ERRCODE
NTP:ERROR:CTL_INVALID_CLK_SRC
NTP:ERROR:MSG_WITHIN_POLL_INTVL
NTP:ERROR:SERVER_SYNCH_ALARM
NTP:ERROR:MSG_TOO_SHORT
NTP:ERROR:CTL_NONSTD_VAR_NAME
NTP:ERROR:INVALID_DISPERSION
NTP:ERROR:MSG_TOO_LONG
NTP:ERROR:CTL_VAR_VALUE_2LONG
NTP:ERROR:CTL_INVALID_OPCODE
NTP:ERROR:CTL_INVALID_EVCODE

NTP:INVALID

NTP:INVALID:CTL_DATA_MULTI_PKT
NTP:INVALID:CTL_CLKERR_RPRTED
NTP:INVALID:TIMESTMP_NOT_MATCH

OS:AIX

OS:AIX:PDNSD-OF

OS:LINUXX86

OS:LINUXX86:NTALKD-OF
OS:LINUXX86:MOUNTD-OF-3
OS:LINUXX86:MOUNTD-OF-2
OS:LINUXX86:NTPDX-OF
OS:LINUXX86:BOOTP-OF
OS:LINUXX86:POP2-OF-1
OS:LINUXX86:SCTP-CHUNKLESS
OS:LINUXX86:POP2-OF-2
OS:LINUXX86:MOUNTD-OF-1
OS:LINUXX86:LPRNG-OF

OS:SCOX86

OS:SCOX86:CALSERVER-OF

OS:SOLARISX86

OS:SOLARISX86:NLPS-OF

P2P

P2P:UNIFS

P2P:ARES

P2P:ARES:UDP-PEER-CHECK
P2P:ARES:PEER-CONNECT-UDP
P2P:ARES:PEER-CONNECT-TCP

P2P:AUDIT

P2P:AUDIT:GNUTELLA-PUSH-LEN
P2P:AUDIT:GNUTELLA-MESSAGE
P2P:AUDIT:GNUTELLA-HDR-ATRB
P2P:AUDIT:GNUTELLA-UNSUP-VER
P2P:AUDIT:GNUTELLA-SVR-RESP
P2P:AUDIT:GNUTELLA-LINE
P2P:AUDIT:GNUTELLA-BYE-TTL
P2P:AUDIT:GNUTELLA-PING-LEN
P2P:AUDIT:GNUTELLA-HTTP-GET
P2P:AUDIT:GNUTELLA-RTABLE-UPD
P2P:AUDIT:GNUTELLA-PONG-LEN
P2P:AUDIT:GNUTELLA-OK-RESP
P2P:AUDIT:GNUTELLA-MSG
P2P:AUDIT:GNUTELLA-TTL
P2P:AUDIT:GNUTELLA-SEARCH
P2P:AUDIT:GNUTELLA-EOL
P2P:AUDIT:GNUTELLA-QUERY
P2P:AUDIT:SOFTETHER-SSH
P2P:AUDIT:SE-HUB-LOOK

P2P:BEARSHARE

P2P:BEARSHARE:UA
P2P:BEARSHARE:LOGIN
P2P:BEARSHARE:DJ-SERVICE
P2P:BEARSHARE:FILE-XFER
P2P:BEARSHARE:SEARCH

P2P:BITTORRENT

P2P:BITTORRENT:BT-ENCRYPTED
P2P:BITTORRENT:TRACKER-QUERY
P2P:BITTORRENT:TRACKER-SCRAPE
P2P:BITTORRENT:BT-SEARCH
P2P:BITTORRENT:HANDSHAKE
P2P:BITTORRENT:BT-TRACKER-DOS
P2P:BITTORRENT:CONTENT-TYPE
P2P:BITTORRENT:TRACKER-QUERY-2
P2P:BITTORRENT:KICKASSTORRENTS
P2P:BITTORRENT:DHT4
P2P:BITTORRENT:BITCOMET-CHUNK
P2P:BITTORRENT:DHT
P2P:BITTORRENT:UTORRENT-UDP
P2P:BITTORRENT:DOT-TORRENT
P2P:BITTORRENT:TRACKER-UDP
P2P:BITTORRENT:BTCLIENT-UA

P2P:DC

P2P:DC:HUB-LOGIN
P2P:DC:ACTIVE
P2P:DC:DNS-QUERY

P2P:EDONKEY

P2P:EDONKEY:S2C-PONG-RESPONSE
P2P:EDONKEY:CLIENT-DOS-ATK
P2P:EDONKEY:CLIENT-HELLO
P2P:EDONKEY:CLIENT-VER-CHECK
P2P:EDONKEY:OTHER-SVR-INFO-REQ
P2P:EDONKEY:FILE-DOWNLOAD-REQ
P2P:EDONKEY:FILE-SEARCH-REQ
P2P:EDONKEY:FILE-SHARES
P2P:EDONKEY:C2S-PING-BEACON
P2P:EDONKEY:PORT-53

P2P:EMULE

P2P:EMULE:PLUS-VER-CHECK
P2P:EMULE:DECODE16-OVERFLOW
P2P:EMULE:VERYCD
P2P:EMULE:KADEMLIA-KAD

P2P:FREENET

P2P:FREENET:CONNECTION

P2P:GNUCLEUSLAN

P2P:GNUCLEUSLAN:BROADCAST
P2P:GNUCLEUSLAN:CONNECT

P2P:GNUTELLA

P2P:GNUTELLA:CONNECT
P2P:GNUTELLA:CONNECTION-OK-V06
P2P:GNUTELLA:UDP-TRAFFIC
P2P:GNUTELLA:LIMEWIRE-DIR-TRANS
P2P:GNUTELLA:X-GNUTELLA
P2P:GNUTELLA:DOWNLOAD
P2P:GNUTELLA:FILE-XCH-TCP
P2P:GNUTELLA:URN-DOWNLOAD-REQ

P2P:GROKSTER

P2P:GROKSTER:GROKSTER

P2P:KAZAA

P2P:KAZAA:FILE-SEND
P2P:KAZAA:FILE-REQ
P2P:KAZAA:PEER-REQ
P2P:KAZAA:UDP-PROBE
P2P:KAZAA:WEB-CONN
P2P:KAZAA:FILE-HASH

P2P:LIMEWIRE

P2P:LIMEWIRE:FREEWIRE

P2P:MISC

P2P:MISC:GLUZ
P2P:MISC:XOLOX
P2P:MISC:IMESH
P2P:MISC:P2P-NETWORKING
P2P:MISC:PHEX
P2P:MISC:KUGOO-LOGIN
P2P:MISC:SOULSEEK
P2P:MISC:MUTE
P2P:MISC:POCO-UDP
P2P:MISC:POCO-CONNECT
P2P:MISC:PEERENABLE
P2P:MISC:MANOLITO
P2P:MISC:HOTLINE
P2P:MISC:APPLEJUICE
P2P:MISC:KUGOO
P2P:MISC:FREECAST
P2P:MISC:100BAO
P2P:MISC:OPENFT
P2P:MISC:PPLIVE-TRACKER-OFF-REQ
P2P:MISC:MEDIASEEK-PL-CLIENT
P2P:MISC:MANOLITO-DOWNLOAD
P2P:MISC:PPLIVE-HTTP-CLIENT-REQ

P2P:MLDONKEY

P2P:MLDONKEY:CLIENT-ACTIVE

P2P:MORPHEUS

P2P:MORPHEUS:MORPHEUS

P2P:NAPSTER

P2P:NAPSTER:UPLOAD-REQ-8888
P2P:NAPSTER:DOWNLOAD-7777
P2P:NAPSTER:LOGIN-7777
P2P:NAPSTER:DOWNLOAD-8888
P2P:NAPSTER:DATA-7777
P2P:NAPSTER:DATA-4444
P2P:NAPSTER:DATA-6666
P2P:NAPSTER:USER-LOGIN-8888
P2P:NAPSTER:SERVER-LOGIN
P2P:NAPSTER:LOGIN-8888
P2P:NAPSTER:UPLOAD-REQ-7777
P2P:NAPSTER:DATA-6699
P2P:NAPSTER:DATA-5555
P2P:NAPSTER:DATA-8888
P2P:NAPSTER:USER-LOGIN-7777

P2P:OVERNET

P2P:OVERNET:KEEP-ALIVE
P2P:OVERNET:FILE-SHARES
P2P:OVERNET:PEER-DISCOVERY
P2P:OVERNET:CONNECTED
P2P:OVERNET:KADEMILIA-OVERNET
P2P:OVERNET:CONNECT-REQ

P2P:SHAREAZA

P2P:SHAREAZA:CLIENT-ACTIVE

P2P:VUZE

P2P:VUZE:TIVO-DISCO-BEACON
P2P:VUZE:HTTP-CLIENT-MODE
P2P:VUZE:USER-AGENT
P2P:VUZE:BIN-DHT
P2P:VUZE:HTTP-RPC-ACTIVITY

P2P:WINMX

P2P:WINMX:CLIENT-VER-CHK
P2P:WINMX:CLIENT-VER-CHK-DNS
P2P:WINMX:CLIENT-NET-PRB-DNS
P2P:WINMX:CLIENT-MATCHMAKE-DNS
P2P:WINMX:SERVER-SUPERNODE-LIST
P2P:WINMX:CLIENT-NET-PROBE
P2P:WINMX:SERVER-CONNECT-OK
P2P:WINMX:DOWNLOAD

P2P:WINNY

P2P:WINNY:PEER-CONNECT

P2P:XUNLEI

P2P:XUNLEI:STARTUP
P2P:XUNLEI:OVER-HTTP
P2P:XUNLEI:QUERY
P2P:XUNLEI:DOWNLOAD
P2P:XUNLEI:UDP
P2P:XUNLEI:MESSSAGE

POP3

POP3:EXTERNAL_MESSAGE
POP3:EMAIL-SCRIPT
POP3:EUDORA-MAIL-CLIENT
POP3:POP-SCRIPT-TAG
POP3:LOTUS-DOC-VIEWER
POP3:MAL-LOTUS-APPLIX
POP3:APPLE-ICAL-PARAM-BO
POP3:APPLE-ICAL-ATTACH-DOS
POP3:MS-OUTLOOK-EXP-MHTML-CE
POP3:MS-OUTLOOK-2003-OBJ-SEC-BS
POP3:SUSPICIOUS-FROM-HEADER
POP3:IBM-NOTES-PNG-OVF
POP3:SUSPICIOUS-TO-HEADER
POP3:OUTLOOK-OBJECT-TAG
POP3:MS-WORD-BULLET-MC

POP3:AUDIT

POP3:AUDIT:REQ-NESTED-REQUEST
POP3:AUDIT:REQ-UNKNOWN-CMD
POP3:AUDIT:LOGIN-FAILED
POP3:AUDIT:COMMAND-FAILED
POP3:AUDIT:INVALID-FILENAME
POP3:AUDIT:EMPTY-BOUNDARY
POP3:AUDIT:ILLEGAL-FILENAME
POP3:AUDIT:DUPLICATE-HEADER
POP3:AUDIT:REQ-INVALID-STATE

POP3:DOS

POP3:DOS:WINGATE
POP3:DOS:INWEB-HELO-DOS
POP3:DOS:MDAEMON-POP-DOS
POP3:DOS:ULTRAISO-CUE-BO

POP3:ERROR

POP3:ERROR:BOUNDARY_MISSING
POP3:ERROR:PARTIAL_MESSAGE
POP3:ERROR:ILLEGAL_MIME_ENCODE
POP3:ERROR:UNFINISHED_MULTIPART
POP3:ERROR:INVALID_BASE64_CHAR
POP3:ERROR:DUPLICATE_BOUNDARY
POP3:ERROR:TOO_MANY_BOUNDARIES
POP3:ERROR:ILLEGAL_ENCODE

POP3:EXT

POP3:EXT:DOUBLE-EXTENSION
POP3:EXT:DOT-PIF
POP3:EXT:DOT-SCR
POP3:EXT:DOT-EXE
POP3:EXT:DOT-SHS
POP3:EXT:DOT-VBS
POP3:EXT:DOT-WSH
POP3:EXT:DOT-HTA
POP3:EXT:DOT-BAT
POP3:EXT:DOT-OCX
POP3:EXT:DOT-CPL
POP3:EXT:DOT-WSC
POP3:EXT:DOT-VBE
POP3:EXT:DOT-VB
POP3:EXT:DOT-REG
POP3:EXT:DOT-SCT
POP3:EXT:DOT-PCD
POP3:EXT:DOT-LNK
POP3:EXT:DOT-MDB
POP3:EXT:DOT-MSP
POP3:EXT:DOT-MDE
POP3:EXT:DOT-JSE
POP3:EXT:DOT-CHM
POP3:EXT:DOT-INS
POP3:EXT:DOT-INF
POP3:EXT:DOT-ADE
POP3:EXT:DOT-CRT
POP3:EXT:DOT-ADP
POP3:EXT:DOT-BAS
POP3:EXT:DOT-386
POP3:EXT:DOT-WSZ-WAL
POP3:EXT:DOT-WMF
POP3:EXT:DOT-GRP
POP3:EXT:DOT-HT
POP3:EXT:DOT
POP3:EXT:DOT-JS
POP3:EXT:DOT-CMD
POP3:EXT:DOT-MSC
POP3:EXT:DOT-ISP
POP3:EXT:DOT-URL
POP3:EXT:DOT-COM
POP3:EXT:DOT-WSF
POP3:EXT:DOT-HLP
POP3:EXT:DOT-ZIP
POP3:EXT:DOT-MSI

POP3:FAILURE

POP3:FAILURE:BRUTE-FORCE

POP3:OUTLOOK

POP3:OUTLOOK:HRALIGN-OF
POP3:OUTLOOK:MULTIPLE-FROM
POP3:OUTLOOK:LOCAL-LINK
POP3:OUTLOOK:CRAFTED-RESP
POP3:OUTLOOK:MHTML-CDI
POP3:OUTLOOK:OL-IFRAME-EXEC
POP3:OUTLOOK:TROUBLE-QUERY-OF

POP3:OVERFLOW

POP3:OVERFLOW:FILENAME2LONG
POP3:OVERFLOW:BOUNDARY_OVERFLOW
POP3:OVERFLOW:COMMAND
POP3:OVERFLOW:LINE
POP3:OVERFLOW:APOP
POP3:OVERFLOW:PASS
POP3:OVERFLOW:TXTLINE_2LONG
POP3:OVERFLOW:CONTENT_NAME
POP3:OVERFLOW:USER
POP3:OVERFLOW:BSD-OFLOW-2
POP3:OVERFLOW:BSD-OFLOW-1
POP3:OVERFLOW:LINUX-OFLOW
POP3:OVERFLOW:SCO-POP3-OVERFLOW
POP3:OVERFLOW:QPOP-OF3
POP3:OVERFLOW:QPOP-OF2
POP3:OVERFLOW:PCCILLIN-POP-OF
POP3:OVERFLOW:ERR-RPLY-OF
POP3:OVERFLOW:HTTP-LINK-OF
POP3:OVERFLOW:AXIGEN-FS
POP3:OVERFLOW:EUDORA-URL-BOF
POP3:OVERFLOW:PEEPER-UIDL
POP3:OVERFLOW:QPOP-OF4
POP3:OVERFLOW:CURL-LIBCURL-BO

POP3:REQERR

POP3:REQERR:REQ-SYNTAX-ERROR
POP3:REQERR:REQ-MESSAGE-NUMBER
POP3:REQERR:REQ-BINARY-DATA

POP3:USER

POP3:USER:ROOT

PORTMAPPER

PORTMAPPER:GETADDR-RESP-MAL-UA

PORTMAPPER:AUDIT

PORTMAPPER:AUDIT:ROOT-ACCESS

PORTMAPPER:ERR

PORTMAPPER:ERR:WRONG-DIR
PORTMAPPER:ERR:LONG-NETNAME
PORTMAPPER:ERR:SHORT-READ
PORTMAPPER:ERR:LARGE-CRED

PORTMAPPER:INFO

PORTMAPPER:INFO:NULL-PROC
PORTMAPPER:INFO:SET-PROC
PORTMAPPER:INFO:DUMP_PROC
PORTMAPPER:INFO:UNSET-PROC
PORTMAPPER:INFO:CALLIT-PROC
PORTMAPPER:INFO:PORTMAP-DUMP

PORTMAPPER:INVALID

PORTMAPPER:INVALID:BAD-CRED-LEN
PORTMAPPER:INVALID:BAD-VERF-CRD

PROTOCOLS:PORT

PROTOCOLS:PORT:POP3
PROTOCOLS:PORT:FTP
PROTOCOLS:PORT:TELNET
PROTOCOLS:PORT:SIP
PROTOCOLS:PORT:SSH
PROTOCOLS:PORT:HTTP

PROTOCOLS:TRAFFIC

PROTOCOLS:TRAFFIC:NOT-DNS-TCP
PROTOCOLS:TRAFFIC:NOT-IMAP
PROTOCOLS:TRAFFIC:NOT-DHCP
PROTOCOLS:TRAFFIC:NOT-FTP
PROTOCOLS:TRAFFIC:NOT-HTTP
PROTOCOLS:TRAFFIC:NOT-DNS-UDP
PROTOCOLS:TRAFFIC:NOT-TELNET
PROTOCOLS:TRAFFIC:NOT-POP3
PROTOCOLS:TRAFFIC:NOT-SMTP

RADIUS

RADIUS:ACC_ACCEPT_INV_NATTRS
RADIUS:MALFORMED_VENDOR_ATTR
RADIUS:ACCCHA_DISALLOWD_ATTR
RADIUS:INVALID_MSG_CODE
RADIUS:ACSREQ_INV_NUM_ATTRS
RADIUS:ACCCHAL_INV_NUM_ATTRS
RADIUS:ACC_ACC_DISALOWD_ATTR
RADIUS:ACCREQ_DISALLOWD_ATTR
RADIUS:ACCREJ_INV_NUM_ATTRS
RADIUS:ACSREQ_DISALLOWD_ATTR
RADIUS:ACCREQ_INV_NUM_ATTRS
RADIUS:ACCREJ_DISALLOWD_ATTR
RADIUS:ACCREQ_ATTR_MISSING
RADIUS:INVALID_MSG_LENGTH
RADIUS:INVALID_ATTR_LENGTH
RADIUS:MSG_TOO_SHORT
RADIUS:RADIUS-BRUTE-FORCE
RADIUS:INVALID_ATTR_TYPE
RADIUS:ACCREP_DISALLOWD_ATTR
RADIUS:INCONSISTANT_LENGTH
RADIUS:RADIUS-USR-OF
RADIUS:FREERADIUS-DOS
RADIUS:CLIENT-CERT-VERIF-BO
RADIUS:FS-INJ
RADIUS:TYPE-DOS

REXEC:AUDIT

REXEC:AUDIT:PARAM-NOT-OK
REXEC:AUDIT:ILL-ERR-PORT

REXEC:OVERFLOW

REXEC:OVERFLOW:USERNAME
REXEC:OVERFLOW:COMMAND
REXEC:OVERFLOW:PASSWORD

RLOGIN:AUDIT

RLOGIN:AUDIT:REQ-ILLEGAL-PORT
RLOGIN:AUDIT:PARAM-NOT-OK

RLOGIN:FAILURE

RLOGIN:FAILURE:LOGIN-FAILURE

RLOGIN:INFO

RLOGIN:INFO:RLOGIN-LOGIN

RLOGIN:OVERFLOW

RLOGIN:OVERFLOW:TERMINAL
RLOGIN:OVERFLOW:USERNAME
RLOGIN:OVERFLOW:LONG-ARGS

RLOGIN:REQERR

RLOGIN:REQERR:DATA-IN-1ST-LINE

RLOGIN:USER

RLOGIN:USER:USER-ECHO
RLOGIN:USER:USER-BIN
RLOGIN:USER:USER-ROOT
RLOGIN:USER:ROOT-ACCESS

RPC

RPC:KRB5-LIB-OF
RPC:AUTOMOUNTD-OF
RPC:EMC-LEGATO-NW-OF
RPC:KADMIND-OF
RPC:NULL-TADDR2UADDR
RPC:WDB-AGENT
RPC:PCNFSD-FS
RPC:KADMIND-RENAME
RPC:SOL-CDE-CALENDAR-MGR
RPC:CALL-IT-OF
RPC:KADMIND-KLOG
RPC:SUN-SOLARIS-SADMIND-BO
RPC:SUN-SOLARIS-SADMIND-ADM
RPC:XDR-INTEGER-OVERFLOW
RPC:YPUPDATED-CMD-INJ
RPC:RLPR-FS

RPC:AUDIT

RPC:AUDIT:INVALID-DIR
RPC:AUDIT:GETPORT-FAILED
RPC:AUDIT:REQUEST-DENIED
RPC:AUDIT:REQ-INVALID-XID

RPC:FAILURE

RPC:FAILURE:SET-FAILED
RPC:FAILURE:UNSET-FAILED
RPC:FAILURE:CALLIT-FAILED

RPC:REQERR

RPC:REQERR:REQ-INVALID-PROC

RPC:RPC.CMSD

RPC:RPC.CMSD:RPC-CMSD-OVERFLOW

RPC:RPC.MOUNTD

RPC:RPC.MOUNTD:SHOWMOUNT
RPC:RPC.MOUNTD:LINUX-MOUNTD-OBO
RPC:RPC.MOUNTD:SHOWMOUNT-UDP
RPC:RPC.MOUNTD:XLINK-IOF
RPC:RPC.MOUNTD:SHOWMOUNT-TCP

RPC:RPC.SADMIND

RPC:RPC.SADMIND:SADMIND-OF
RPC:RPC.SADMIND:ADM-METHOD-TRAV

RPC:RPC.SNMPXDMID

RPC:RPC.SNMPXDMID:OVERFLOW

RPC:RPC.STATD

RPC:RPC.STATD:RPC-STATD-OF
RPC:RPC.STATD:STATD-FMT-STR2
RPC:RPC.STATD:AUTOMOUNT-TLI
RPC:RPC.STATD:STATD-FMT-STR4
RPC:RPC.STATD:STATD-FMT-STR1
RPC:RPC.STATD:STATD-FMT-STR5

RPC:RPC.TTDBSERVER

RPC:RPC.TTDBSERVER:TT-MAL-OF
RPC:RPC.TTDBSERVER:TT-MAL-FS-3
RPC:RPC.TTDBSERVER:TT-REAL-PATH
RPC:RPC.TTDBSERVER:TT-MAL-FS-2
RPC:RPC.TTDBSERVER:TT-MAL-FS

RPC:RPC.WALLD

RPC:RPC.WALLD:WALLD-ERR-FTSTR-2
RPC:RPC.WALLD:SYSLOG-FS

RPC:RWHOD

RPC:RWHOD:RWHOD-NULL-INJ

RSH:AUDIT

RSH:AUDIT:REQ-ILLEGAL-ERR-PORT
RSH:AUDIT:REQ-ILLEGAL-PORT
RSH:AUDIT:PARAM-OK
RSH:AUDIT:PARAM-NOT-OK

RSH:FAILURE

RSH:FAILURE:LOGIN-FAILURE

RSH:OVERFLOW

RSH:OVERFLOW:USERNAME
RSH:OVERFLOW:COMMAND
RSH:OVERFLOW:WINRSHD-OF
RSH:OVERFLOW:WIN-DAEMON-BO

RSH:USER

RSH:USER:USER-BIN
RSH:USER:USER-ROOT
RSH:USER:USER-ECHO

RSYNC

RSYNC:EXCLUDE-OF
RSYNC:CHUNK-OF
RSYNC:DIR-TRAV

RTSP

RTSP:VLC-BO
RTSP:PLAY
RTSP:SETUP-EMPTY
RTSP:SET-PARAMETER
RTSP:SETUP-HDR
RTSP:EMPTY-HEADER
RTSP:SETUP
RTSP:MS-MEDIA-PLAYER-MC
RTSP:HELIX-RN5AUTH
RTSP:UBIQUITI-AIRCAM-BOF
RTSP:DESCRIBE-BOF
RTSP:MAL-RTSP

RTSP:EXPLOIT

RTSP:EXPLOIT:INVALID-PORT

RTSP:OVERFLOW

RTSP:OVERFLOW:LINE-OF
RTSP:OVERFLOW:DESCRIBE-OF
RTSP:OVERFLOW:TRANSPORT-OF
RTSP:OVERFLOW:STREAMCOUNT
RTSP:OVERFLOW:LOADTEST-PW-OF
RTSP:OVERFLOW:RTSP-CONTENT

RTSP:REALSERVER

RTSP:REALSERVER:REAL-SETUP-OF3
RTSP:REALSERVER:REAL-SETUP-OF2
RTSP:REALSERVER:REAL-SETUP-OF4
RTSP:REALSERVER:MAL-HEADER
RTSP:REALSERVER:REAL-SETUP-OF1

RUSERS:AUDIT

RUSERS:AUDIT:INVALID-XID
RUSERS:AUDIT:REQ-DENIED
RUSERS:AUDIT:ROOT-ACCESS
RUSERS:AUDIT:UNKNOWN-VER

RUSERS:ERR

RUSERS:ERR:SHORT-READ
RUSERS:ERR:LONG-NETNAME
RUSERS:ERR:LARGE-CRED
RUSERS:ERR:WRONG-DIR

RUSERS:INFO

RUSERS:INFO:UNKNOWN-PROG

RUSERS:INVALID

RUSERS:INVALID:INVALID-PROC
RUSERS:INVALID:INVALID-DIR
RUSERS:INVALID:BAD-VERF-CRED
RUSERS:INVALID:BAD-CRED-LEN

RUSERS:OVERFLOW

RUSERS:OVERFLOW:HOST-OVERFLOW
RUSERS:OVERFLOW:USER-OVERFLOW
RUSERS:OVERFLOW:DEV-OVERFLOW

SCADA

SCADA:SIEMENS-TECNO-VRN-OF
SCADA:WWSUITE
SCADA:REALWIN
SCADA:DEQFACTORY-NETB
SCADA:SCADATEC-PROCYON
SCADA:CITECT-OF
SCADA:SIEMENS-SIMATIC-MINIWEB
SCADA:SIEMENS-SIMATIC-S7-300
SCADA:ICONICS-GENBROKER
SCADA:SIEMENS-SIMATIC-CPU-RCE
SCADA:DATAC-REALWIN-OF
SCADA:MEASURESOFT-SCADAPRO-RCE
SCADA:SIEMENS-SIMATIC-HMILOAD
SCADA:KINGVIEW-HISTORYSRV-OC3
SCADA:SCADATEC-MODBUS-BO
SCADA:DATAC-REALWIN-MULT-BOF
SCADA:7T-INTERACTIVE-IGSS-OF
SCADA:PROGEA-MOVICON-SEC-BYPASS
SCADA:SIEMENS-TECNO-CSSERVICE
SCADA:KINGVIEW-HISTORYSVR-OF
SCADA:SIEMENS-AUTO-LM-DOS
SCADA:SIEMENS-CSSERVICE-BOF
SCADA:COGENT-DATAHUB-BO
SCADA:MOXA-MDM-BO
SCADA:BACNET-OPC-CLIENT-OF
SCADA:OPTIMA-APIFTP-DOS
SCADA:3S-CODESYS-DIR-TRAVERSAL
SCADA:CODESYS-FOLDER-CREATION
SCADA:SIEMENS-AUTO-LM-NULL
SCADA:WINLOG-TCP-OF
SCADA:SCADAPHONE-OF-DOS
SCADA:SIEMENS-SIMATIC-HMIL-DIR
SCADA:SIEMENS-AUTO-LM-SERIALID
SCADA:7T-INTERACTIVE-DC-OF
SCADA:CODESYS-GATEWAY-SERVICE
SCADA:CIP-UNAUTH-CMDEXEC
SCADA:SUNWAY-FORCECONTROL-OF
SCADA:3S-CODESYS-GWS-DIRTRVRSL
SCADA:CODESYS-CMPWEBSERVER
SCADA:CODESYS-GATEWAY-DOS
SCADA:CODESYS-BO
SCADA:CODESYS-HEAP-OVF
SCADA:CODESYS-MEM-ERR
SCADA:ABB-WSERVER-CMD-EXEC
SCADA:SIELCO-SISTEMI-WINLOG-BOF
SCADA:CODESYS-CONTROL-SERVICE
SCADA:ABB-MICROSCADA-BOF
SCADA:SCHNEIDER-ELEC-INTER-BOF

SCADA:DNP3

SCADA:DNP3:WARM-RESTART
SCADA:DNP3:COLD-RESTART
SCADA:DNP3:RESPONSE-DOS
SCADA:DNP3:DISABLE-RESP
SCADA:DNP3:BROADCAST
SCADA:DNP3:STOP
SCADA:DNP3:READ
SCADA:DNP3:MISC-REQ
SCADA:DNP3:WRITE
SCADA:DNP3:NON-DNP3

SCADA:ICCP

SCADA:ICCP:INVALID-TPDU
SCADA:ICCP:WRONG-DT-PARAMETER
SCADA:ICCP:REASON-CODE-LENGTH
SCADA:ICCP:WRONG-AB-PARAMETER
SCADA:ICCP:CN-INVALID-LENGTH
SCADA:ICCP:UNSUPPORTED-SERVICE
SCADA:ICCP:WRONG-CN-PARA
SCADA:ICCP:UNSUPPORTED-TPDU
SCADA:ICCP:WRONG-FN-PARAMETER
SCADA:ICCP:CN-INVALID
SCADA:ICCP:BUFFER-SIZE
SCADA:ICCP:INVALID-VERSION
SCADA:ICCP:DISCONNECT-CODE

SCADA:IEC104

SCADA:IEC104:SHORT-MSG
SCADA:IEC104:MESSAGE-OVERFLOW
SCADA:IEC104:MALFORMED-MESSAGE
SCADA:IEC104:INVALID-UDP-MSG
SCADA:IEC104:SESSION
SCADA:IEC104:SESSION-ALT-PORT
SCADA:IEC104:MESSAGE-TYPEU-FN
SCADA:IEC104:INVALID-START-TAG
SCADA:IEC104:TYPE-S
SCADA:IEC104:TYPE-I
SCADA:IEC104:TYPE-U

SCADA:MODBUS

SCADA:MODBUS:OVERLONG-PDU
SCADA:MODBUS:NOT-MODBUS
SCADA:MODBUS:BAD-PROTO-ID
SCADA:MODBUS:INVALID-UNI-ID
SCADA:MODBUS:SHORT-PDU
SCADA:MODBUS:TRAILING-DATA
SCADA:MODBUS:UNDERFLOW
SCADA:MODBUS:LISTEN-ONLY
SCADA:MODBUS:BUSY-EXCEPTION
SCADA:MODBUS:LENGTH
SCADA:MODBUS:DOS
SCADA:MODBUS:INVALID-HEADER
SCADA:MODBUS:SLAVE-ID
SCADA:MODBUS:READ-ID
SCADA:MODBUS:CLEAR
SCADA:MODBUS:READ
SCADA:MODBUS:WRITE
SCADA:MODBUS:INPUT-INT-OF
SCADA:MODBUS:OPC-SVR-HEAP-CORR

SCAN

SCAN:DARKD0RK3R-XSS
SCAN:ACUNETIX
SCAN:MFS-PROBE
SCAN:PYSMBLIB
SCAN:DARKD0RK3R-LFI
SCAN:W3AF
SCAN:DIRBUSTER-UA
SCAN:BREAKINGPOINT-HTTP

SCAN:ADM

SCAN:ADM:FTP-SCAN

SCAN:AMAP

SCAN:AMAP:FTP-SCAN
SCAN:AMAP:AMAP-USER
SCAN:AMAP:SAP-R3-ON-HTTP
SCAN:AMAP:SAP-R3-ON-SMTP
SCAN:AMAP:SSL-SCAN
SCAN:AMAP:SAP-R3-ON-SSH

SCAN:APPDETECTIVE

SCAN:APPDETECTIVE:HTTPS
SCAN:APPDETECTIVE:LDAP-UA
SCAN:APPDETECTIVE:HTTP-UA

SCAN:AUDIT

SCAN:AUDIT:NBSTAT-QUERY
SCAN:AUDIT:ARACHNI-WEB-SCANNER

SCAN:CANVAS

SCAN:CANVAS:NETWORKER-3
SCAN:CANVAS:LINUXSNMP
SCAN:CANVAS:ESERV
SCAN:CANVAS:MAILENABLE
SCAN:CANVAS:TIVOLI3
SCAN:CANVAS:WORDMAIL3
SCAN:CANVAS:FEDORA4
SCAN:CANVAS:INGRESS
SCAN:CANVAS:NOVELL2
SCAN:CANVAS:HELIUM-AGENT

SCAN:CERBERUS

SCAN:CERBERUS:SMTP
SCAN:CERBERUS:FTP
SCAN:CERBERUS:HTTP

SCAN:CORE

SCAN:CORE:SAMBA-TRANS2
SCAN:CORE:SAMBA-NTTRANS
SCAN:CORE:MP-IE-ZONE-BYPASS
SCAN:CORE:DNS-STD-QUERY
SCAN:CORE:JPEG-GDI-VGX-EXPLOIT
SCAN:CORE:EXPLOIT-UNPACK
SCAN:CORE:OPENSSH-CHANNEL
SCAN:CORE:NTPD-CTRL-MSG-OF
SCAN:CORE:MSRPC-WKSSVC
SCAN:CORE:SQL-SERVER-HELLO
SCAN:CORE:TELNETD-LOGIN
SCAN:CORE:AGENT-LOAD-WIN
SCAN:CORE:EXPLOIT-UNPACK-HTTP
SCAN:CORE:IIS-ASP-CHUNKED

SCAN:CYBERCOP

SCAN:CYBERCOP:OS-PROBE-1
SCAN:CYBERCOP:UDP-BOMB
SCAN:CYBERCOP:OS-PROBE-2
SCAN:CYBERCOP:FINGER-REDIR
SCAN:CYBERCOP:SMTP-EXPN
SCAN:CYBERCOP:SMTP-EHLO
SCAN:CYBERCOP:FINGER-QUERY

SCAN:II

SCAN:II:IIS-ISAPI-ENUM
SCAN:II:ISAKMP-FLOOD
SCAN:II:ALLAIRE-CF-OF
SCAN:II:TIQ-WMF-MAL-HEADER

SCAN:ISS

SCAN:ISS:FTP-SCAN

SCAN:METASPLOIT

SCAN:METASPLOIT:LSASS
SCAN:METASPLOIT:VICTIM-PROFILE
SCAN:METASPLOIT:TWIKI-CONF-CMD
SCAN:METASPLOIT:JS-HEAPLIB
SCAN:METASPLOIT:METERPRETER-DLL
SCAN:METASPLOIT:JAVA-APPLET
SCAN:METASPLOIT:EXECCOMMAND-UAF
SCAN:METASPLOIT:APACHE-CHUNK-OF
SCAN:METASPLOIT:SMB-ACTIVE

SCAN:MISC

SCAN:MISC:QUERY
SCAN:MISC:MSTREAM-REP-12754
SCAN:MISC:MSTREAM-REP-15104
SCAN:MISC:CAT-ETC-PASSWD-UDP
SCAN:MISC:ADMROCKS-UDP
SCAN:MISC:SYN-FIN
SCAN:MISC:IDP-TEST
SCAN:MISC:NULL
SCAN:MISC:SVR-RES-S1024
SCAN:MISC:MSTREAM-CLIENT-REQ
SCAN:MISC:ADMROCKS-TCP
SCAN:MISC:NETCAT-DOEXEC-BO
SCAN:MISC:USER-LIST

SCAN:MISC:FTP

SCAN:MISC:FTP:FTP-MKD-DOT
SCAN:MISC:FTP:FTP-MKD
SCAN:MISC:FTP:PATH-LINUX-X86-2
SCAN:MISC:FTP:OPENBSD-X86
SCAN:MISC:FTP:PPC-FS1
SCAN:MISC:FTP:LOGXFR-OF2
SCAN:MISC:FTP:LOGXFR-OF1
SCAN:MISC:FTP:BSD-FTPD-MKD-OF
SCAN:MISC:FTP:FREEBSD-FTPD-GLOB
SCAN:MISC:FTP:REALPATH-OF2
SCAN:MISC:FTP:REALPATH-OF1
SCAN:MISC:FTP:PATH-LINUX-X86-1

SCAN:MISC:HTTP

SCAN:MISC:HTTP:LWGATE-PROBE
SCAN:MISC:HTTP:POSTING-ATTEMPT
SCAN:MISC:HTTP:EDIT-DOC-ATTEMPT
SCAN:MISC:HTTP:MAN-SH-PROBE
SCAN:MISC:HTTP:VTI-BIN-PROBE
SCAN:MISC:HTTP:CPSHOST-DLL
SCAN:MISC:HTTP:STORE-ACCESS
SCAN:MISC:HTTP:SNORK-ACCESS
SCAN:MISC:HTTP:ANNEX-DOS
SCAN:MISC:HTTP:TESTCOUNTER
SCAN:MISC:HTTP:W2TVARS-PM-PROBE
SCAN:MISC:HTTP:QUERYHIT-ACCESS
SCAN:MISC:HTTP:README-EML
SCAN:MISC:HTTP:WIN-ARGS-CMD
SCAN:MISC:HTTP:WIN-PERL
SCAN:MISC:HTTP:WIN-NC
SCAN:MISC:HTTP:WIN-ARGS-BAT
SCAN:MISC:HTTP:MEM-BIN-PROBE
SCAN:MISC:HTTP:CSS-PROBE
SCAN:MISC:HTTP:ACHG-HTR-PROBE
SCAN:MISC:HTTP:CNF-PROBE
SCAN:MISC:HTTP:EDIT-ACCESS
SCAN:MISC:HTTP:ADMCGI-EXE-PROBE
SCAN:MISC:HTTP:EXAMPLEAPP-PRB
SCAN:MISC:HTTP:ADMIN-NSF-ACCESS
SCAN:MISC:HTTP:CFGWIZ-EXE-PROBE
SCAN:MISC:HTTP:MAINFRMST-PROBE
SCAN:MISC:HTTP:MSDAC-PROBE
SCAN:MISC:HTTP:UPLOAD-PROBE
SCAN:MISC:HTTP:ADMADM-EXE-PROBE
SCAN:MISC:HTTP:MSPROXY-PROBE
SCAN:MISC:HTTP:CFAPPMAN-PROBE
SCAN:MISC:HTTP:SYNTXCHK-PROBE
SCAN:MISC:HTTP:SNIPPETS-PROBE
SCAN:MISC:HTTP:ADMADM-HTM-PROBE
SCAN:MISC:HTTP:MAILLIST-PROBE
SCAN:MISC:HTTP:CONT-HTM-PROBE
SCAN:MISC:HTTP:RWWWSH-ACCESS
SCAN:MISC:HTTP:START-STOP-DOS
SCAN:MISC:HTTP:MACHINEINFO
SCAN:MISC:HTTP:WWW-SQL-PROBE
SCAN:MISC:HTTP:FILES-ACCESS
SCAN:MISC:HTTP:DELETE-DOC
SCAN:MISC:HTTP:ADMIN
SCAN:MISC:HTTP:SEARCH-VTS
SCAN:MISC:HTTP:WEB-MAP-ACCESS
SCAN:MISC:HTTP:WEBDRIVER-ACCESS
SCAN:MISC:HTTP:WAIS-ACCESS
SCAN:MISC:HTTP:FINGER-PROBE
SCAN:MISC:HTTP:SENDFORM-ACCESS
SCAN:MISC:HTTP:SENDMESSAGE
SCAN:MISC:HTTP:FLEXFORM-PROBE
SCAN:MISC:HTTP:AX-ADMIN-ACCESS
SCAN:MISC:HTTP:MMSTDOD-PROBE
SCAN:MISC:HTTP:HTGROUP-ACCESS
SCAN:MISC:HTTP:ENVIRON-CGI
SCAN:MISC:HTTP:REQ-HTTP-CONF
SCAN:MISC:HTTP:POST-QUERY-PROBE
SCAN:MISC:HTTP:MINISTATS-ADM
SCAN:MISC:HTTP:AXS-ACCESS
SCAN:MISC:HTTP:FILEMAIL-ACCESS
SCAN:MISC:HTTP:RESPONDER-ACCESS
SCAN:MISC:HTTP:BIGCONF-ACCESS
SCAN:MISC:HTTP:PERLSHOP-PROBE
SCAN:MISC:HTTP:WIN-RCMD
SCAN:MISC:HTTP:WIN-TELNET-EXE
SCAN:MISC:HTTP:WIN-CD..
SCAN:MISC:HTTP:REPOST-ACCESS
SCAN:MISC:HTTP:SCRIPTS-BROWSE
SCAN:MISC:HTTP:PERL-PROBE
SCAN:MISC:HTTP:DCFORUM-ACCESS
SCAN:MISC:HTTP:TILDA-ROOT
SCAN:MISC:HTTP:DIR-LISTING
SCAN:MISC:HTTP:WEBTRENDS-PROBE
SCAN:MISC:HTTP:CODE-ACCESS
SCAN:MISC:HTTP:UNIX-BIN-CSH
SCAN:MISC:HTTP:WIN-WSH
SCAN:MISC:HTTP:VIOLATION-ACCS
SCAN:MISC:HTTP:WS-FTP-INI-ATMPT
SCAN:MISC:HTTP:BACKUP-REQ
SCAN:MISC:HTTP:SWEDITSERVLET
SCAN:MISC:HTTP:WEBHITS-ACCESS
SCAN:MISC:HTTP:WEBSITEPRO
SCAN:MISC:HTTP:NPH-PUBLISH
SCAN:MISC:HTTP:INTRANET-REQ
SCAN:MISC:HTTP:SITE-IISAMPLES
SCAN:MISC:HTTP:SRCH-HTM-PROBE
SCAN:MISC:HTTP:SRCADM-PROBE
SCAN:MISC:HTTP:VIEWCODE-ASP
SCAN:MISC:HTTP:CYBERCOP-HTTP
SCAN:MISC:HTTP:NESSUS-HTTP
SCAN:MISC:HTTP:HTW-ACCESS
SCAN:MISC:HTTP:SERVER-INFO
SCAN:MISC:HTTP:VOIDEYE
SCAN:MISC:HTTP:IIS-SAMPLES
SCAN:MISC:HTTP:IIS-NEWDSN
SCAN:MISC:HTTP:TEST-DOT-CGI
SCAN:MISC:HTTP:WEBCOM-EXE
SCAN:MISC:HTTP:FORMHANDLER
SCAN:MISC:HTTP:ALIBABA
SCAN:MISC:HTTP:QUID-PRO-QUO-LOG
SCAN:MISC:HTTP:SEARCH97-VTS
SCAN:MISC:HTTP:HEAD
SCAN:MISC:HTTP:DAY5DATA-PROBE
SCAN:MISC:HTTP:UPLOADER-EXE
SCAN:MISC:HTTP:ADMIN-FILES
SCAN:MISC:HTTP:HTGREP-ACCESS
SCAN:MISC:HTTP:TRACE
SCAN:MISC:HTTP:PUT
SCAN:MISC:HTTP:CONTEXTADMIN
SCAN:MISC:HTTP:IPLANET-GETPROP
SCAN:MISC:HTTP:ARCHITEXT-QUERY
SCAN:MISC:HTTP:AUTH-ACCESS
SCAN:MISC:HTTP:WWWADM-ACCESS
SCAN:MISC:HTTP:CACHEMGR-ACCESS
SCAN:MISC:HTTP:SHELL-ACCESS
SCAN:MISC:HTTP:NETCAT-CMD
SCAN:MISC:HTTP:TEST-PROBE
SCAN:MISC:HTTP:TEST-CGI-INFO
SCAN:MISC:HTTP:WIN-C-SAMPLE
SCAN:MISC:HTTP:WIN-TFTP-EXE

SCAN:MISC:TELNET

SCAN:MISC:TELNET:SU-ROOT
SCAN:MISC:TELNET:SU-BIN
SCAN:MISC:TELNET:STROBE
SCAN:MISC:TELNET:TELNET-PORT-25
SCAN:MISC:TELNET:ETC-GROUP
SCAN:MISC:TELNET:CD-BIN-HIDDEN
SCAN:MISC:TELNET:NC
SCAN:MISC:TELNET:APPEND-PASSWD
SCAN:MISC:TELNET:CD-DOT-DOT-DOT
SCAN:MISC:TELNET:ID
SCAN:MISC:TELNET:MKDIR
SCAN:MISC:TELNET:CD-USR-HIDDEN
SCAN:MISC:TELNET:CD-VAR-HIDDEN
SCAN:MISC:TELNET:TELNET-PORT-21
SCAN:MISC:TELNET:XHOST-PLUS
SCAN:MISC:TELNET:CAT-ETC-PASSWD
SCAN:MISC:TELNET:CAT-ETC-INETD
SCAN:MISC:TELNET:NMAP
SCAN:MISC:TELNET:APPEND-RHOSTS
SCAN:MISC:TELNET:SHUTDOWN
SCAN:MISC:TELNET:XHOST
SCAN:MISC:TELNET:VI-ETC-PASSWD
SCAN:MISC:TELNET:VI-ETC-GROUP
SCAN:MISC:TELNET:REBOOT
SCAN:MISC:TELNET:SU-WRNG-GRP
SCAN:MISC:TELNET:CISCO
SCAN:MISC:TELNET:TELNET-PORT-80

SCAN:NESSUS

SCAN:NESSUS:ISS-DIR-LISTING
SCAN:NESSUS:NPH-PUBLISH-CGI
SCAN:NESSUS:GLOBAL-ASA
SCAN:NESSUS:SMTP-SCAN
SCAN:NESSUS:TFTP-SCAN
SCAN:NESSUS:SSH
SCAN:NESSUS:DNS-SCAN
SCAN:NESSUS:HTTP-USER-AGENT
SCAN:NESSUS:SMB-SCAN
SCAN:NESSUS:COUNT-CGI

SCAN:NETECT

SCAN:NETECT:SMTP

SCAN:NEXPOSE

SCAN:NEXPOSE:SNMP-PROBE
SCAN:NEXPOSE:SQLD-PROBE
SCAN:NEXPOSE:TFTP-PROBE

SCAN:NIKTO

SCAN:NIKTO:USER-AGENT
SCAN:NIKTO:URL

SCAN:NMAP

SCAN:NMAP:FINGERPRINT
SCAN:NMAP:XMAS
SCAN:NMAP:NMAP-UDP-1
SCAN:NMAP:NSE-HTTP-UA

SCAN:PISS

SCAN:PISS:FTP-SCAN

SCAN:RETINA

SCAN:RETINA:FTP

SCAN:RPVS

SCAN:RPVS:XSS-URL

SCAN:RVSCAN

SCAN:RVSCAN:FTP

SCAN:SAINT

SCAN:SAINT:FTP-SCAN

SCAN:SATAN

SCAN:SATAN:FTP-SCAN

SCAN:SENTINEL

SCAN:SENTINEL:TELNET-SPOOF

SCAN:SSH-RESEARCH

SCAN:SSH-RESEARCH:ACTIVITY

SCAN:WEBTRENDS

SCAN:WEBTRENDS:UDP-PROBE

SCAN:XPROBE

SCAN:XPROBE:XPROBE-BADCODE

SCREENOS

SCREENOS:IDS_ICMP_TIME_EXCEED
SCREENOS:IDS_ICMP_TS_REQUEST
SCREENOS:IDS_ICMP_TS_REPLY
SCREENOS:IDS_IP_OPT_RECORD
SCREENOS:IDS_ICMP_INFO_REQUEST
SCREENOS:IDS_ICMP_INFO_REPLY
SCREENOS:IDS_IP_OPT_TIMESTAMP
SCREENOS:IDS_IP_OPT_LSR
SCREENOS:UDP_FLOOD
SCREENOS:IDS_IP_OPT_SCHT
SCREENOS:IDS_ICMP_ECHO_REPLY
SCREENOS:IDS_ICMP_HOST_UNREACH
SCREENOS:IDS_SYN_FRAG
SCREENOS:IDS_IP_OPT_STREAM
SCREENOS:IDS_COMPONENT
SCREENOS:IDS_IP_UNKNOWN_PROT
SCREENOS:IDS_IP_OPT_SSR
SCREENOS:MULTI_AUTH_FAIL
SCREENOS:CONNECT_SME_PORT
SCREENOS:DENY_POLICY
SCREENOS:CONNECT_CMS_PORT
SCREENOS:IP_SOURCE_ROUTE
SCREENOS:IDS_ICMP_ADDR_MSK_REP
SCREENOS:IDS_ICMP_FRAGMENT
SCREENOS:IDS_ICMP_REDIRECT
SCREENOS:IDS_TCP_FIN_NO_ACK
SCREENOS:IDS_IP_BLOCK_FRAG
SCREENOS:IDS_ICMP_SRC_QUENCH
SCREENOS:IDS_ICMP_ECHO_REQUEST
SCREENOS:IDS_ICMP_ADDR_MSK_REQ
SCREENOS:IDS_ICMP_PARA_PROB
SCREENOS:IDS_TCP_NO_FLAG

SHELLCODE

SHELLCODE:PREPENDENCODER-HTTP
SHELLCODE:JS-UNICODE
SHELLCODE:PHP-REVERSE-SHELL
SHELLCODE:JS-ESCAPE-HIGH-ASCII
SHELLCODE:PREPENDENCODER-TCP
SHELLCODE:JS-UNESCAPE-MAL
SHELLCODE:SYSKILL
SHELLCODE:IPTABLES-FLUSH
SHELLCODE:JS-FROMCHARCODE
SHELLCODE:JS-HEX-ESCAPE
SHELLCODE:PHP-SHELL-URI
SHELLCODE:IPTABLES-FLUSH-HTTP

SHELLCODE:ACTIVE

SHELLCODE:ACTIVE:DECODER3-80-CL
SHELLCODE:ACTIVE:DCDR-1-UDP-CLT
SHELLCODE:ACTIVE:DECODER2-80-CL
SHELLCODE:ACTIVE:BIND-1-HTTP-CL
SHELLCODE:ACTIVE:REVERSE-80-CLT
SHELLCODE:ACTIVE:REVERSE-80-SVR
SHELLCODE:ACTIVE:DCDR-1-TCP-SVR
SHELLCODE:ACTIVE:BIND-1-SMB-SVR
SHELLCODE:ACTIVE:JS-ESCAPE
SHELLCODE:ACTIVE:BIND-1-TCP-CLT
SHELLCODE:ACTIVE:BIND-1-TCP-SVR
SHELLCODE:ACTIVE:DCDR-1-TCP-CLT
SHELLCODE:ACTIVE:BIND-1-SMB-CLT
SHELLCODE:ACTIVE:DECODER1-80-CL
SHELLCODE:ACTIVE:REVERSE-1-SMB
SHELLCODE:ACTIVE:DECODER3-80-SV
SHELLCODE:ACTIVE:DECODER2-80-SV
SHELLCODE:ACTIVE:BIND-1-UDP-CLT
SHELLCODE:ACTIVE:DCDR-2-TCP-SRV
SHELLCODE:ACTIVE:RVRS-1-UDP-CLT
SHELLCODE:ACTIVE:REVERSE-1-TCP
SHELLCODE:ACTIVE:DCDR-1-UDP-SVR
SHELLCODE:ACTIVE:DCDR-2-TCP-CLT
SHELLCODE:ACTIVE:DCDR-3-TCP-CLT
SHELLCODE:ACTIVE:DCDR-2-UDP-CLT
SHELLCODE:ACTIVE:DCDR-3-UDP-CLT
SHELLCODE:ACTIVE:DECODER1-80-SV
SHELLCODE:ACTIVE:BIND-1-HTTP-SR
SHELLCODE:ACTIVE:BIND-1-UDP-SVR
SHELLCODE:ACTIVE:DCDR-3-TCP-SVR
SHELLCODE:ACTIVE:DCDR-2-UDP-SVR
SHELLCODE:ACTIVE:DCDR-3-UDP-SVR
SHELLCODE:ACTIVE:RVRS-1-UDP-SVR

SHELLCODE:LINUXX86

SHELLCODE:LINUXX86:CHMDSDW-HTTP
SHELLCODE:LINUXX86:CHMOD-SHADOW
SHELLCODE:LINUXX86:UNLINK-HTTP
SHELLCODE:LINUXX86:UNLINK

SHELLCODE:METASPLOIT

SHELLCODE:METASPLOIT:FNSTENV-CL
SHELLCODE:METASPLOIT:FTENV-SMB2
SHELLCODE:METASPLOIT:FTENV80-CL
SHELLCODE:METASPLOIT:JS-ACTIVEX
SHELLCODE:METASPLOIT:PEX
SHELLCODE:METASPLOIT:FTENV-SMB1
SHELLCODE:METASPLOIT:JS-ABOUT
SHELLCODE:METASPLOIT:DCX86-80-S
SHELLCODE:METASPLOIT:JAVA-APP
SHELLCODE:METASPLOIT:JS-UNESC
SHELLCODE:METASPLOIT:ASCII-HEX
SHELLCODE:METASPLOIT:JSOBFU-NEW
SHELLCODE:METASPLOIT:GREENDAM
SHELLCODE:METASPLOIT:DCX86-UDP1
SHELLCODE:METASPLOIT:ALPHA-HTTP
SHELLCODE:METASPLOIT:ALPHA
SHELLCODE:METASPLOIT:JAVA-JAR
SHELLCODE:METASPLOIT:PROPSPRAY
SHELLCODE:METASPLOIT:JS-OBFUS
SHELLCODE:METASPLOIT:DCX86-TCP2
SHELLCODE:METASPLOIT:GEN-FTP
SHELLCODE:METASPLOIT:DCX86-UDP2
SHELLCODE:METASPLOIT:DCX86-TCP1
SHELLCODE:METASPLOIT:DCX86-80-C
SHELLCODE:METASPLOIT:FTENV80-SV
SHELLCODE:METASPLOIT:FNSTENV-SV
SHELLCODE:METASPLOIT:PEXA
SHELLCODE:METASPLOIT:PEX-HTTP
SHELLCODE:METASPLOIT:PEXA-HTTP

SHELLCODE:SPARC

SHELLCODE:SPARC:WRITE-EXIT
SHELLCODE:SPARC:BIN-KSH

SHELLCODE:WINDOWS

SHELLCODE:WINDOWS:WIN-SHELL
SHELLCODE:WINDOWS:SMB-REM-EXEC1
SHELLCODE:WINDOWS:7-SHUTDOWN
SHELLCODE:WINDOWS:7-TASKMGR
SHELLCODE:WINDOWS:PARTITION-FMT
SHELLCODE:WINDOWS:SMB-REM-EXEC2
SHELLCODE:WINDOWS:7-EXPTERM

SHELLCODE:X86

SHELLCODE:X86:NOOP-TCP
SHELLCODE:X86:LINUX-REBOOT
SHELLCODE:X86:LINUX-SSH-PORTFWD
SHELLCODE:X86:SHIKATA-GANAI-SVR
SHELLCODE:X86:SHIKATAGANAI-80-S
SHELLCODE:X86:SHIKATA-GANAI-CLT
SHELLCODE:X86:CHMOD-ROOT-RWX
SHELLCODE:X86:SHIKATAGANAI-80-C

SMB

SMB:DUPLICATE-SESSION
SMB:REFLECTION
SMB:NTLM-LOGIN-FAILED
SMB:CONNECT-FROM-LOCALHOST
SMB:MAILSLOT-OF
SMB:XTIERRPCPIPE
SMB:USER-CMD-INJ
SMB:DOUBLE-NEGO-RESP
SMB:SMB-SRV-NAME-DOS
SMB:INTERNET-PRINT-SVC-INT-OF
SMB:NETDDE-SHARE-OF
SMB:SEARCH-OF
SMB:TIMBUKTU-PLUGHNT-COMMAND
SMB:MS-RAP-HEAP-OV
SMB:SMB20-NEG-DOS
SMB:SERVER-SVC-OF
SMB:TRANS2ROOT-OF
SMB:TRANS2ROOT-OF-2
SMB:FRAG-EXP-CODE
SMB:MS-RAP-STACK-OV
SMB:NTLM-LOW-ENTROPY
SMB:MS-IE-IESHIMS-DLL-CE
SMB:MS-WIN-VISTA-SP0-SMB-DOS
SMB:HTTP-PAYLOAD
SMB:FRAG-MALICIOUS-PAYLOAD
SMB:MS-WIN-2000-LANMAN-DOS
SMB:MS-WIN-2000-LANMAN-UDP-DOS
SMB:MS-TELNET-INSECURE-LOADING
SMB:MSSQL-DECLARE-EXEC
SMB:CLIENT-MESSAGE-OF
SMB:WINS-SNAME-REG
SMB:SAMBA-UNICODE-FLAGS2-DOS
SMB:CLIENT-POOL-CORR
SMB:SMB-COPY-OF
SMB:TRANSACTION-RESPONSE-OF
SMB:OLEAUT32-WMF
SMB:ORACLE-JRE-INSECURE-LOAD
SMB:VISIO-MFC71XXX-DLL-HIJACK
SMB:DCE-RPC-FRAG-MAL-PAYLOAD
SMB:DCE-RPC-FRAG-EXP-PAYLOAD
SMB:MS-RAP-DOS
SMB:MAL-WIN-BRIEFCASE
SMB:PNG-CHUNK-OF

SMB:AUDIT

SMB:AUDIT:NULL-NVE-LM
SMB:AUDIT:NT-LM-0.12
SMB:AUDIT:NULL-DOMAIN
SMB:AUDIT:NULL-NVE-OS
SMB:AUDIT:EXT-SEC-DISABLED
SMB:AUDIT:UNK-DIALECT
SMB:AUDIT:INV-PROTOCOL
SMB:AUDIT:NULL-ACCOUNT
SMB:AUDIT:EXP-NEG
SMB:AUDIT:UNEXP-REP
SMB:AUDIT:UNEXP-REQ
SMB:AUDIT:LONG-ACCOUNT
SMB:AUDIT:UNK-SHDR-TYPE
SMB:AUDIT:UNK-CMD
SMB:AUDIT:DCERPC-UNEXPECTED-RSP
SMB:AUDIT:OLD-VERSION
SMB:AUDIT:INVALID-DATACOUNT

SMB:ENUM

SMB:ENUM:NAME-LOOKUP
SMB:ENUM:NETSESSION

SMB:ERROR

SMB:ERROR:MAL-MSG
SMB:ERROR:GRIND
SMB:ERROR:INV-MSG-LEN
SMB:ERROR:MULTI-HEADERS

SMB:EXPLOIT

SMB:EXPLOIT:NULL-PATH
SMB:EXPLOIT:NULL-FILENAME
SMB:EXPLOIT:NULL-SERVICE
SMB:EXPLOIT:WINBLAST-DOS
SMB:EXPLOIT:REGISTRY-DOS
SMB:EXPLOIT:SMB-SHRE-NAME-OFLOW
SMB:EXPLOIT:LANMAN-NUKE
SMB:EXPLOIT:SAMBA-DIR-TRAV
SMB:EXPLOIT:SMBDIE
SMB:EXPLOIT:DOT-JOB
SMB:EXPLOIT:MAL-JPEG-DL
SMB:EXPLOIT:TRANS2-MDL-CHUNK
SMB:EXPLOIT:WILD-FILE-DOS
SMB:EXPLOIT:FOLDER-COM-EXEC
SMB:EXPLOIT:GREENAPPLE-2
SMB:EXPLOIT:ISS-ACCOUNTNAME-OF
SMB:EXPLOIT:FLASH-CHROME-BREAK
SMB:EXPLOIT:SMB-MULTI-DOS
SMB:EXPLOIT:LLS-NAME
SMB:EXPLOIT:GREENAPPLE
SMB:EXPLOIT:LINUX-TRANS2-OF
SMB:EXPLOIT:MPLAYER-SAMI
SMB:EXPLOIT:PRINT-SPOOL-BYPASS
SMB:EXPLOIT:SMB1-CHAINING-MC
SMB:EXPLOIT:SMB2-ZERO-LEN-WRT
SMB:EXPLOIT:SRV-RENAME-CE

SMB:EXT

SMB:EXT:DOT-ZIP

SMB:FILE

SMB:FILE:EICAR-COPY
SMB:FILE:AUTORUN.INF-COPY
SMB:FILE:WIRESHARK-INSECUREPATH
SMB:FILE:MS-OBJ-PACKAGER
SMB:FILE:CRAFTED-NAME-RCE
SMB:FILE:DLL-TRANSFER
SMB:FILE:NAME-INV-CHARS
SMB:FILE:WEB-VIEW-DOC-SCR-INJ

SMB:INFO

SMB:INFO:WFWGRP-3.1A
SMB:INFO:MSNET-1.03
SMB:INFO:LANMAN-2.1
SMB:INFO:LANMAN-1.2X002
SMB:INFO:LANMAN-1.0
SMB:INFO:NULL-GSS-TOKEN
SMB:INFO:XENIX-CORE
SMB:INFO:PCLAN-1.0
SMB:INFO:NEG-FAILED
SMB:INFO:DOT-EXE-FILE-XFER

SMB:NETBIOS

SMB:NETBIOS:INV-CDNAME-ENC
SMB:NETBIOS:INV-CGNAME-LEN
SMB:NETBIOS:INV-CDNAME-LEN
SMB:NETBIOS:INV-SNAME-LEN
SMB:NETBIOS:INV-CGNAME-ENC
SMB:NETBIOS:SHARE-LVL-SEC
SMB:NETBIOS:INV-SHDR-LEN
SMB:NETBIOS:UNK-SHDR-FLAGS
SMB:NETBIOS:RMT-REG-ACCESS
SMB:NETBIOS:RRAS-MEM-CORRUPTION
SMB:NETBIOS:WIN-RPC-UPNP-DOS
SMB:NETBIOS:WIN7-KERNEL-DOS

SMB:OF

SMB:OF:ACCOUNT-NAME-OVERFLOW
SMB:OF:DIALECT-INDEX-OVERFLOW
SMB:OF:SECUR-TOKEN-OVERFLOW
SMB:OF:LINUX-KERNEL-INT-OF
SMB:OF:NETCONMGR-DOS
SMB:OF:SPOOL-SVC-OF
SMB:OF:SMB-IPC-OF
SMB:OF:WKSSVC-CALL
SMB:OF:NETWARE-CLIENT-RPC
SMB:OF:SMB-INVALID-BUFFER
SMB:OF:PNP-OF
SMB:OF:RPC-PNP-OF
SMB:OF:RECV-RAW-BO
SMB:OF:CREATE-NEG-EOF
SMB:OF:TAPI-SVC-OF
SMB:OF:DFS-RESP
SMB:OF:MAL-QFILEPATHINFO
SMB:OF:MANGLING-FILE-OF
SMB:OF:SMB2-DOS-2
SMB:OF:RECV-RAW
SMB:OF:NWCW-INV-CALL
SMB:OF:MS-SMB2-RES-DOS
SMB:OF:SMB2-WRITE-OFFSET

SMB:SAMBA

SMB:SAMBA:NTRANS-RPLY
SMB:SAMBA:SWAT-AUTH-DOS
SMB:SAMBA:NETDFS-OF
SMB:SAMBA:DFSENUM-OF
SMB:SAMBA:READ-NTTRANS-EA-LIST
SMB:SAMBA:SID-QUOTA
SMB:SAMBA:ROOT-SYS
SMB:SAMBA:SETINFOPOLICY-HEAP
SMB:SAMBA:SMBD-ANDX-INFINITE
SMB:SAMBA:SPOOLSS-NOTIFY
SMB:SAMBA:LSALOOKUPSIDS
SMB:SAMBA:IDL-PARSE-OOB

SMB:TOOLS

SMB:TOOLS:PSEXEC

SMTP

SMTP:SPAM-ADDRESS-EVASION
SMTP:AUTO-SPAM
SMTP:RCPT-CMD-INJ
SMTP:MSSQL-WORM-EMAIL
SMTP:WP5-EMAIL
SMTP:HTML-VAL-XSS
SMTP:REALPLAYER-WAV-BO
SMTP:SPAM-ASSN-INJ
SMTP:SYM-NESTED-ZIP
SMTP:SAGTUBE-DOS
SMTP:BANNER-CAPTURE
SMTP:INVALID-HELO
SMTP:SPAMASSASS-LM-DOS
SMTP:NASM-PPSCAN-BO
SMTP:FROM-FIELD-FS
SMTP:FFSMOUNTFS-BOF
SMTP:SPAMASS-DOS
SMTP:SQWEBMAIL-EMAIL-HEADER-INJ
SMTP:MERCMAIL-AUTH-OF
SMTP:IPSWITCH-REPLY-TO-OF
SMTP:SMTP-URI-INJ
SMTP:URL-LOC

SMTP:AUDIT

SMTP:AUDIT:EXTERNAL-MESG
SMTP:AUDIT:REQ-HDR-FLD-UNKNOWN
SMTP:AUDIT:ENCODE-MIME-TYPE
SMTP:AUDIT:REQ-MISSING-HELLO
SMTP:AUDIT:REQ-UNKNOWN-CMD
SMTP:AUDIT:REQ-INVALID-CMD-SEQ
SMTP:AUDIT:MISSING-MAIL-FROM
SMTP:AUDIT:REQ-NESTED-REQUEST
SMTP:AUDIT:REP-NESTED-REPLY
SMTP:AUDIT:REP-INVALID-REPLY
SMTP:AUDIT:COMMAND-FAILED
SMTP:AUDIT:EMPTY-BOUNDARY
SMTP:AUDIT:DUPLICATE-HEADER
SMTP:AUDIT:INVALID-FILENAME
SMTP:AUDIT:REQ-MISSING-RCPT-TO
SMTP:AUDIT:ENCODE
SMTP:AUDIT:REQ-BINARY-DATA
SMTP:AUDIT:REQ-BIN-DATA-3
SMTP:AUDIT:HIGH-VOLUME
SMTP:AUDIT:REQ-BIN-DATA-2

SMTP:COMMAND

SMTP:COMMAND:EXPN
SMTP:COMMAND:VRFY
SMTP:COMMAND:TURN
SMTP:COMMAND:DEBUG
SMTP:COMMAND:HELP
SMTP:COMMAND:WIZ
SMTP:COMMAND:ETRN
SMTP:COMMAND:AV-INETSERV-DOS
SMTP:COMMAND:BDAT
SMTP:COMMAND:STARTTLS-CMD

SMTP:DOS

SMTP:DOS:SMARTMAIL-DOS
SMTP:DOS:EUDORA-MIME-DOS
SMTP:DOS:SENDMAIL-HEADERS-DOS
SMTP:DOS:MS-MALWARE-ENGINE
SMTP:DOS:MS-XL-2003-NULL-DOS
SMTP:DOS:GNU-SCRUBBER-UTF8-DOS
SMTP:DOS:GNU-MAILMAN-DATE-DOS
SMTP:DOS:CLAM-TNEF-DOS

SMTP:EMAIL

SMTP:EMAIL:MAIL-FROM-PIPE
SMTP:EMAIL:HEADER-TO-PIPE
SMTP:EMAIL:REPLY-TO-PIPE
SMTP:EMAIL:RCPT-TO-DECODE
SMTP:EMAIL:HEADER-FROM-PIPE
SMTP:EMAIL:EUDORA-SPOOF1
SMTP:EMAIL:EUDORA-SPOOF3
SMTP:EMAIL:EUDORA-LONG-MSG-URL
SMTP:EMAIL:EUDORA-SPOOF4
SMTP:EMAIL:RELAY-ADDR-OF
SMTP:EMAIL:RCPT-TO-PIPE
SMTP:EMAIL:IBM-LOTUS-NTS-WPD-BO

SMTP:EXCHANGE

SMTP:EXCHANGE:MIME-MALF-ATTACH
SMTP:EXCHANGE:INV_BDAT_SEC_LEN
SMTP:EXCHANGE:INV_BDAT_CMD
SMTP:EXCHANGE:SCT_XEXCH50_2LONG
SMTP:EXCHANGE:CMD_XEXCH50_2LONG
SMTP:EXCHANGE:INVLD_XEXCH50_CMD
SMTP:EXCHANGE:XLINK2_TOO_LONG
SMTP:EXCHANGE:CALENDAR-HEAP
SMTP:EXCHANGE:AUTH-GUEST
SMTP:EXCHANGE:MAILROUTE-OF
SMTP:EXCHANGE:IMAP-DOS
SMTP:EXCHANGE:MAL-VERB-XEXCH50
SMTP:EXCHANGE:OWA-CSS
SMTP:EXCHANGE:ICAL-DOS
SMTP:EXCHANGE:MS03-046-CHECK
SMTP:EXCHANGE:EXCH-TNEF-BO
SMTP:EXCHANGE:OWA-JSCRIPT
SMTP:EXCHANGE:MULTI-MAILROUTE
SMTP:EXCHANGE:MULTI-LONG-MAILRT

SMTP:EXPLOIT

SMTP:EXPLOIT:RELAY-ATTEMPT
SMTP:EXPLOIT:PINE-BOUNDARY
SMTP:EXPLOIT:PINE-SLASHQUOTE
SMTP:EXPLOIT:SENDMAIL-IDENTEXEC
SMTP:EXPLOIT:RELAY-ATTEMPT-VAR
SMTP:EXPLOIT:EUDORA-URL-SPOOF
SMTP:EXPLOIT:MIME-TOOLS-EVADE
SMTP:EXPLOIT:DMAIL-FS
SMTP:EXPLOIT:KERIO-MS-FS
SMTP:EXPLOIT:EMAIL-ADDR-FS
SMTP:EXPLOIT:PINE-CHARSET-OF-1
SMTP:EXPLOIT:HCP-QUOTE-SCRIPT
SMTP:EXPLOIT:EXIM-DOVECOT-RCE
SMTP:EXPLOIT:POSTFIX-AUTH-REUSE
SMTP:EXPLOIT:AVI-RIGHT-CLICK
SMTP:EXPLOIT:MAL-AU-DOS
SMTP:EXPLOIT:SUSPICIOUS-TO
SMTP:EXPLOIT:SUSPICIOUS-FROM
SMTP:EXPLOIT:QT-PICT-FILE-MC
SMTP:EXPLOIT:BITDEF-LOG
SMTP:EXPLOIT:GNUPG-INT-OF
SMTP:EXPLOIT:MS-THEME-RCE

SMTP:EXT

SMTP:EXT:DOUBLE-EXTENSION
SMTP:EXT:DOT-PIF
SMTP:EXT:DOT-SCR
SMTP:EXT:DOT-SHS
SMTP:EXT:DOT-VBS
SMTP:EXT:DOT-EXE
SMTP:EXT:DOT-CMD
SMTP:EXT:DOT-COM
SMTP:EXT:DOT-BAT
SMTP:EXT:DOT-OCX
SMTP:EXT:DOT-WSF
SMTP:EXT:DOT-WSH
SMTP:EXT:DOT-JOB
SMTP:EXT:DOT-VB
SMTP:EXT:DOT-WSC
SMTP:EXT:DOT-SCT
SMTP:EXT:DOT-PCD
SMTP:EXT:DOT-JSE
SMTP:EXT:DOT-MSP
SMTP:EXT:DOT-MDE
SMTP:EXT:DOT-MSI
SMTP:EXT:DOT-MDB
SMTP:EXT:DOT-REG
SMTP:EXT:DOT-MSC
SMTP:EXT:DOT-CRT
SMTP:EXT:DOT-HLP
SMTP:EXT:DOT-ADE
SMTP:EXT:DOT-CHM
SMTP:EXT:DOT-ADP
SMTP:EXT:DOT-INF
SMTP:EXT:DOT-BAS
SMTP:EXT:DOT-JS
SMTP:EXT:DOT-INS
SMTP:EXT:DOT-WMF
SMTP:EXT:DOT-HTA
SMTP:EXT:DOT-WSZ
SMTP:EXT:DOT-GRP
SMTP:EXT:DOT-HT
SMTP:EXT:DOT-ANI
SMTP:EXT:DOT
SMTP:EXT:FILE-AVI
SMTP:EXT:DOT-PPT
SMTP:EXT:DOT-386
SMTP:EXT:DOT-URL
SMTP:EXT:DOT-ZIP
SMTP:EXT:DOT-CPL
SMTP:EXT:DOT-ISP
SMTP:EXT:DIR-TRAV
SMTP:EXT:DOUBLE-EXTENSION-MIME
SMTP:EXT:DOT-LNK

SMTP:IIS

SMTP:IIS:SSL-PCT-OF
SMTP:IIS:IIS-ENCAPS-RELAY
SMTP:IIS:CDO-OF

SMTP:INVALID

SMTP:INVALID:BASE64-CHAR
SMTP:INVALID:UNFIN-MULTIPART
SMTP:INVALID:PARTIAL-MESG
SMTP:INVALID:DUP-BOUNDARY
SMTP:INVALID:BOUNDARY-MISS
SMTP:INVALID:2MANY-BOUNDARY
SMTP:INVALID:DUP-AUTH

SMTP:MAILMAN

SMTP:MAILMAN:PASSWD-DISCLOSURE

SMTP:MAJORDOMO

SMTP:MAJORDOMO:COMMAND-EXEC

SMTP:MAL

SMTP:MAL:ACROBAT-UUEXEC
SMTP:MAL:FIREFOX-HTML-URL-INJ
SMTP:MAL:OUTLOOK-MAILTO-QUOT
SMTP:MAL:NOTES-BIGMAIL-DOS
SMTP:MAL:MS-HSC-DVD-VLN
SMTP:MAL:SQM-CONTENT-XSS
SMTP:MAL:NOTES-INI-SMTP
SMTP:MAL:XSS-URL-IN-EMAIL
SMTP:MAL:JPEG-ATTACH-COMMENT-OF
SMTP:MAL:DATA-SCHEME
SMTP:MAL:BMP-MAL-HEADER
SMTP:MAL:WMF-MAL-HEADER
SMTP:MAL:EXIM4-HEADER
SMTP:MAL:TBIRD-JAVASCRIPT
SMTP:MAL:ANI-MAL-HEADER
SMTP:MAL:ANI-ATTACH
SMTP:MAL:MALFORMED-WMF
SMTP:MAL:IBM-ATTACHMENT-VIEWER
SMTP:MAL:MAL-ZIP-HDR
SMTP:MAL:OUTLOOK-SHELL
SMTP:MAL:AIM-BO-URL
SMTP:MAL:LOTUS-VIEWER
SMTP:MAL:LOTUS-LZH-BOF
SMTP:MAL:LOTUS-MIF-VIEWER
SMTP:MAL:LOTUS-DOC-VIEWER
SMTP:MAL:LOTUS-APPLIX
SMTP:MAL:NAV-ZIP-BOMB
SMTP:MAL:LOTUS-WPD
SMTP:MAL:LOTUS-MAILTO
SMTP:MAL:EMAIL-URL-HIDING-ENC

SMTP:OUTLOOK

SMTP:OUTLOOK:DHTML-HANDLER-RACE
SMTP:OUTLOOK:OBJECT-TAG
SMTP:OUTLOOK:HTML-NAME-OF
SMTP:OUTLOOK:OSS-FILE
SMTP:OUTLOOK:MMCN-EXEC
SMTP:OUTLOOK:VML-BOF
SMTP:OUTLOOK:TZID-OF
SMTP:OUTLOOK:TNEF-INT-OF
SMTP:OUTLOOK:RTF-PARSE
SMTP:OUTLOOK:LOCAL-LINK
SMTP:OUTLOOK:VEVENT-MEMCORRUPT
SMTP:OUTLOOK:MHTML-CDI
SMTP:OUTLOOK:W32-PARAM
SMTP:OUTLOOK:OBJECT-TAG-XML
SMTP:OUTLOOK:OWA-XSS
SMTP:OUTLOOK:MIME-PARSE-UAF

SMTP:OVERFLOW

SMTP:OVERFLOW:BOUNDARY
SMTP:OVERFLOW:CONTENT-NAME
SMTP:OVERFLOW:TOO-MANY-RCPT
SMTP:OVERFLOW:FILENAME
SMTP:OVERFLOW:REPLY-LINE
SMTP:OVERFLOW:COMMAND-LINE
SMTP:OVERFLOW:EMAIL-DOMAIN
SMTP:OVERFLOW:EMAIL-USERNAME
SMTP:OVERFLOW:EMAIL-ADDRESS
SMTP:OVERFLOW:TEXT-LINE-OF
SMTP:OVERFLOW:TABS-EHLO-OF
SMTP:OVERFLOW:OUTLOOK-CERT-OF
SMTP:OVERFLOW:SENDMAIL-MIME-OF
SMTP:OVERFLOW:SENDMAIL-CMT-OF2
SMTP:OVERFLOW:SENDMAIL-CMT-OF1
SMTP:OVERFLOW:METAMAIL-HDR-FS2
SMTP:OVERFLOW:METAMAIL-HDR-OF2
SMTP:OVERFLOW:MHTML-OF
SMTP:OVERFLOW:HEADER-LINE-OF
SMTP:OVERFLOW:APPLE-PICT-MC
SMTP:OVERFLOW:MS-WMF-OF
SMTP:OVERFLOW:MAILENABLE-BO
SMTP:OVERFLOW:NTLM-AUTH-OF

SMTP:REQERR

SMTP:REQERR:REQ-DUPLICATE-HELLO
SMTP:REQERR:REQ-SYNTAX-ERROR

SMTP:RESPONSE

SMTP:RESPONSE:BAD-RESPONSE
SMTP:RESPONSE:PIPE-FAILED
SMTP:RESPONSE:USER-UNKNOWN
SMTP:RESPONSE:RLY-PBTED
SMTP:RESPONSE:RLY-ACC-DENIED

SMTP:SENDMAIL

SMTP:SENDMAIL:ADDR-PRESCAN-ATK
SMTP:SENDMAIL:SENDMAIL-FF-OF
SMTP:SENDMAIL:DEBIAN-SASL-AUTH

SMTP:SERVER

SMTP:SERVER:OVERFLOW-WIN-X86

SMTP:VULN

SMTP:VULN:MERCUR-3-3
SMTP:VULN:EXIM-4-20
SMTP:VULN:MERCUR-4-2
SMTP:VULN:CMAILSERVER
SMTP:VULN:MAILENABLE-FS
SMTP:VULN:GROUPWISE-IMG-OF

SNMP

SNMP:FMT-STR-TCP
SNMP:TRAP-DECODE-DOS
SNMP:HMAC-AUTH-BYPASS
SNMP:FREEBSD-GETBULKRQST-BO
SNMP:HMAC-AUTH-BYPASS-EXPLOIT
SNMP:SQUID-PROXY-ASN1-OF
SNMP:SNMPV1
SNMP:SNMPV2U
SNMP:SNMPV2C
SNMP:SNMPV3

SNMP:AUDIT

SNMP:AUDIT:OTHER-ERROR
SNMP:AUDIT:BAD-VALUE
SNMP:AUDIT:PUBLIC
SNMP:AUDIT:PRIVATE
SNMP:AUDIT:SET-REQUEST
SNMP:AUDIT:NO-SUCH-NAME
SNMP:AUDIT:UNKNOWN-VERSION

SNMP:COMMUNITY

SNMP:COMMUNITY:ZERO-LEN
SNMP:COMMUNITY:FORMAT-CHAR
SNMP:COMMUNITY:NULL-CHAR
SNMP:COMMUNITY:AVAYA-DEFCOM1
SNMP:COMMUNITY:SURECOM-RTR
SNMP:COMMUNITY:INTERNAL
SNMP:COMMUNITY:ILMI
SNMP:COMMUNITY:OVERFLOW-1K

SNMP:DANGEROUS

SNMP:DANGEROUS:JETDIRECT-PASS
SNMP:DANGEROUS:LINKSYS-WAP55AG
SNMP:DANGEROUS:SAMSUNG-PRINTERS

SNMP:DOS

SNMP:DOS:GETBULK
SNMP:DOS:CISCO-DOS
SNMP:DOS:WIN-DEL

SNMP:ENCODING

SNMP:ENCODING:GAUGE-TOO-BIG
SNMP:ENCODING:MALFORMED-OID
SNMP:ENCODING:ES-TOO-BIG
SNMP:ENCODING:OIDVAL-TOO-BIG
SNMP:ENCODING:IP-TOO-BIG
SNMP:ENCODING:TT-TOO-BIG
SNMP:ENCODING:VALUE-MISSING
SNMP:ENCODING:EI-TOO-BIG
SNMP:ENCODING:TLEN-TOO-BIG
SNMP:ENCODING:COUNTER-TOO-BIG
SNMP:ENCODING:INT-TOO-BIG
SNMP:ENCODING:ZLEN-FOR-OID
SNMP:ENCODING:ZLEN-FOR-VALUE
SNMP:ENCODING:OID-TOO-LONG
SNMP:ENCODING:NZLEN-FOR-NULL
SNMP:ENCODING:INVALID-MIBROOT
SNMP:ENCODING:GET-BULK-REQ

SNMP:ENUM

SNMP:ENUM:LM2-ACCESS
SNMP:ENUM:ORINOCO-INFO1

SNMP:ERROR

SNMP:ERROR:INVALID-MSG-FORMAT
SNMP:ERROR:INVALID-RESPONSE
SNMP:ERROR:CLIENT-RESPONSE
SNMP:ERROR:MSG-TOO-SHORT
SNMP:ERROR:SERVER-REQUEST
SNMP:ERROR:INV_NON_REPEATERS
SNMP:ERROR:INVALID_GAUGE_VALUE
SNMP:ERROR:INVALID_MAX_REPS
SNMP:ERROR:INVALID_TIMETICKS
SNMP:ERROR:INVALID-REQUEST
SNMP:ERROR:INVALID_ESTATUS

SNMP:INFO

SNMP:INFO:ERR_STAT_COMMIT_FAILD
SNMP:INFO:ERR_STATUS_WRG_LEN
SNMP:INFO:ERR_STAT_NOT_WRITABLE
SNMP:INFO:ERR_STAT_INCON_NAME
SNMP:INFO:ERR_STAT_WRG_ENC
SNMP:INFO:ERR_STAT_WRONG_VAL
SNMP:INFO:ERR_STAT_AUTH_ERROR
SNMP:INFO:ERR_STAT_NO_CREAT
SNMP:INFO:ERR_STAT_RES_UNAVAIL
SNMP:INFO:ERR_STAT_UNDO_FAILD
SNMP:INFO:ERROR_STATUS_GEN_ERR
SNMP:INFO:ERR_STAT_INCON_VAL
SNMP:INFO:ERR_STAT_NO_ACCESS
SNMP:INFO:ERR_STATUS_WRG_TYPE

SNMP:RESPONSE

SNMP:RESPONSE:READ-ONLY
SNMP:RESPONSE:TOO-BIG

SNMPTRAP:AUDIT

SNMPTRAP:AUDIT:PROXY-AGENT
SNMPTRAP:AUDIT:PRIVATE
SNMPTRAP:AUDIT:PUBLIC
SNMPTRAP:AUDIT:UNKNOWN-VERSION

SNMPTRAP:COMMUNITY

SNMPTRAP:COMMUNITY:FORMAT-CHAR
SNMPTRAP:COMMUNITY:ZERO-LEN
SNMPTRAP:COMMUNITY:NULL-CHAR
SNMPTRAP:COMMUNITY:OVERFLOW-1K

SNMPTRAP:ENCODING

SNMPTRAP:ENCODING:TLEN-TOO-BIG
SNMPTRAP:ENCODING:INT-TOO-BIG
SNMPTRAP:ENCODING:IP-TOO-BIG
SNMPTRAP:ENCODING:ZLEN-VALUE
SNMPTRAP:ENCODING:INVALID-MROOT
SNMPTRAP:ENCODING:OID-TOO-LONG
SNMPTRAP:ENCODING:ZLEN-FOR-OID
SNMPTRAP:ENCODING:OVAL-TOO-BIG
SNMPTRAP:ENCODING:MALFORMED-OID
SNMPTRAP:ENCODING:GAUGE-TOO-BIG
SNMPTRAP:ENCODING:CNTR-TOO-BIG
SNMPTRAP:ENCODING:TT-TOO-BIG
SNMPTRAP:ENCODING:NZLEN-NULL

SNMPTRAP:ERROR

SNMPTRAP:ERROR:INVALID-MSG-FMT
SNMPTRAP:ERROR:INV_ERR_STAT
SNMPTRAP:ERROR:INV_GAUGE_VAL
SNMPTRAP:ERROR:INV_ERRSTAT_LEN
SNMPTRAP:ERROR:INV_TIMETICKS
SNMPTRAP:ERROR:UNEXPECTED-REPLY
SNMPTRAP:ERROR:MSG-TOO-SHORT

SNMPTRAP:INFO

SNMPTRAP:INFO:STAT_WRNG_VAL
SNMPTRAP:INFO:STAT_UNDO_FAIL
SNMPTRAP:INFO:STAT_WRNG_TYPE
SNMPTRAP:INFO:ERR_STAT_WRNG_LEN
SNMPTRAP:INFO:STAT_RSUNAVAIL
SNMPTRAP:INFO:ERR_STAT_NO_CREAT
SNMPTRAP:INFO:ERR_STAT_NOT_WRIT
SNMPTRAP:INFO:ERR_STAT_RD_ONLY
SNMPTRAP:INFO:ERR_STAT_WRNG_ENC
SNMPTRAP:INFO:STAT_OTHER_ERR
SNMPTRAP:INFO:ERR_STAT_GEN_ERR
SNMPTRAP:INFO:ERR_STAT_AUTH_ERR
SNMPTRAP:INFO:STAT_INCON_NAME
SNMPTRAP:INFO:ERR_STAT_COM_FAIL
SNMPTRAP:INFO:STAT_INCON_VAL
SNMPTRAP:INFO:ERR_STAT_BAD_VAL
SNMPTRAP:INFO:ERR_STAT_2BIG
SNMPTRAP:INFO:ERR_STAT_NO_ACC
SNMPTRAP:INFO:ERR_STAT_NO_NAME

SPYWARE

SPYWARE:LIGATS

SPYWARE:AD

SPYWARE:AD:DIVXPRO
SPYWARE:AD:7FASST
SPYWARE:AD:BONZIBUD
SPYWARE:AD:YELLOWBRIDGETOOLBAR
SPYWARE:AD:ZIPITFAST
SPYWARE:AD:SMARTPOPS
SPYWARE:AD:WHENU-CLOCKSYNC
SPYWARE:AD:GAMEBAR
SPYWARE:AD:CUSTOMTOOLBAR
SPYWARE:AD:4ARCADEPBAR
SPYWARE:AD:IST-ISTBAR
SPYWARE:AD:WINPUP
SPYWARE:AD:SEEQTOOLBAR
SPYWARE:AD:SEARCHITBAR
SPYWARE:AD:MAPQUEST-TOOLBAR
SPYWARE:AD:WAREZP2P
SPYWARE:AD:BROADCASTPC
SPYWARE:AD:PURITYSCAN
SPYWARE:AD:FUNBUDDYICONS
SPYWARE:AD:CASALEMEDIA
SPYWARE:AD:CRACKSPIDER
SPYWARE:AD:DOWNLOADWARE
SPYWARE:AD:BUNDLEWARE
SPYWARE:AD:ZAPSPOT
SPYWARE:AD:WORDIQTOOLBAR
SPYWARE:AD:CRAZYWINNINGS
SPYWARE:AD:BARGAINBUDDY
SPYWARE:AD:MIDADDLE
SPYWARE:AD:ULTRABAR
SPYWARE:AD:METAEUREKA
SPYWARE:AD:CALLINGHOME-BIZ
SPYWARE:AD:HSADVISORTOOLBAR
SPYWARE:AD:U88
SPYWARE:AD:TOOLBARBROWSER
SPYWARE:AD:STARWARETOOLBAR
SPYWARE:AD:APROPOSMEDIA
SPYWARE:AD:EZULA-TOPTEXT
SPYWARE:AD:ESYNDICATE
SPYWARE:AD:ALTAVISTATOOLBAR
SPYWARE:AD:TRELLIANTOOLBAR
SPYWARE:AD:ASKJEEVESTOOLBAR
SPYWARE:AD:HOTBOTDESKBAR
SPYWARE:AD:SPYWARENUKER
SPYWARE:AD:A9TOOLBAR
SPYWARE:AD:GABESTMEDIAPLAYER
SPYWARE:AD:SHOPNAV
SPYWARE:AD:MYWEBSEARCHTOOLBAR
SPYWARE:AD:COMEDYPLANET
SPYWARE:AD:HXDL
SPYWARE:AD:EZSEARCHBAR
SPYWARE:AD:FREEWAREFILEBAR
SPYWARE:AD:HANSONELLISTOOLBAR
SPYWARE:AD:KAZOOM
SPYWARE:AD:NABAZATOOLBAR
SPYWARE:AD:ASIAFINESTTOOLBAR
SPYWARE:AD:FAVSEARCH
SPYWARE:AD:VIRTUMONDE
SPYWARE:AD:ACTIVESEARCH
SPYWARE:AD:OFFEROPTIMIZER
SPYWARE:AD:BROWSERACCELERATOR
SPYWARE:AD:MEDIATICKETS
SPYWARE:AD:ZUVIO
SPYWARE:AD:WHENUSAVENOW
SPYWARE:AD:VIEWPOINTMEDIA
SPYWARE:AD:COMTRYMUSICDL
SPYWARE:AD:ZENOSEARCH
SPYWARE:AD:KOOLBAR
SPYWARE:AD:POWERZONE
SPYWARE:AD:ATLAS
SPYWARE:AD:PACIMEDIA
SPYWARE:AD:STATIONRIPPER
SPYWARE:AD:GOLDENPALACECASINO
SPYWARE:AD:BTGRAB
SPYWARE:AD:WHENUWEATHERCAST
SPYWARE:AD:NETWORKESSENTIALS
SPYWARE:AD:SIDEFIND
SPYWARE:AD:EXACTNAVISEARCH
SPYWARE:AD:ATGAMES
SPYWARE:AD:CLIPGENIE
SPYWARE:AD:PRAIZETOOLBAR
SPYWARE:AD:ELITEBAR
SPYWARE:AD:BROADCASTURBANTUNER
SPYWARE:AD:WHENUSEARCH
SPYWARE:AD:MYDAILYHOROSCOPE
SPYWARE:AD:SPEDIABAR
SPYWARE:AD:AORNUM
SPYWARE:AD:TRANSPONDERSTUB
SPYWARE:AD:KEENVALUE
SPYWARE:AD:ISEARCH
SPYWARE:AD:IGETNET
SPYWARE:AD:TVZSEARCH
SPYWARE:AD:EXACTSEARCH
SPYWARE:AD:MINIBUG
SPYWARE:AD:IST-POWERSCAN
SPYWARE:AD:CASHBACK
SPYWARE:AD:CASINOONNET
SPYWARE:AD:ADULTLINKS
SPYWARE:AD:BLOWSEARCH
SPYWARE:AD:MYWAYSEARCHBAR
SPYWARE:AD:MONEYBAR
SPYWARE:AD:LINKSPIDERSEARCHBAR
SPYWARE:AD:WINSYSBA
SPYWARE:AD:NETSTER
SPYWARE:AD:MYSEARCHADROTATOR
SPYWARE:AD:HOTOFFERS
SPYWARE:AD:ZTOOLBAR
SPYWARE:AD:AURORA
SPYWARE:AD:MIRAGOSEARCHBAR
SPYWARE:AD:INEXPLORERTOOLBAR
SPYWARE:AD:WINFIXER2005
SPYWARE:AD:ARESPREMIUM
SPYWARE:AD:BLUBSTER-2X
SPYWARE:AD:GROOWESEARCHBAR
SPYWARE:AD:SEARCHHIPPOTOOLBAR
SPYWARE:AD:SC-SEARCH-O-MATIC
SPYWARE:AD:NEWWEB
SPYWARE:AD:EQISO
SPYWARE:AD:ALLSUM
SPYWARE:AD:IMNAMES
SPYWARE:AD:CINMUS
SPYWARE:AD:MOKEAD
SPYWARE:AD:YAYAD
SPYWARE:AD:BORLAN
SPYWARE:AD:ROOGOO
SPYWARE:AD:GOPHORIA010B
SPYWARE:AD:X-CON3.2.8
SPYWARE:AD:HENBANG
SPYWARE:AD:DOWNLOADER-G
SPYWARE:AD:WEBREDIR
SPYWARE:AD:VROOMSEARCH
SPYWARE:AD:PESTBOT
SPYWARE:AD:AVSYSTEMCARE
SPYWARE:AD:COOPEN
SPYWARE:AD:ICOOLOADER25
SPYWARE:AD:PARTYPOKER07
SPYWARE:AD:WINZIX-2-2-0
SPYWARE:AD:DRIVECLEANER10111
SPYWARE:AD:WINANTIVIRUSPRO2007
SPYWARE:AD:PPRICH
SPYWARE:AD:MALWARE-ALARM
SPYWARE:AD:SYSTEM-DOCTOR
SPYWARE:AD:IEDEFENDER
SPYWARE:AD:NETGUARDERWEBCLEANER
SPYWARE:AD:NETWORDAGENT
SPYWARE:AD:3WPLAYER_1_7
SPYWARE:AD:2005SEARCHLOADER
SPYWARE:AD:MALWARE_CRUSH_3_7
SPYWARE:AD:YOURPRIVACYGUARD
SPYWARE:AD:CONTRA_VIRUS
SPYWARE:AD:SPY_SHREDDER_2_1
SPYWARE:AD:NEW-DOT-NET
SPYWARE:AD:DOWNLOAD-ACCEL
SPYWARE:AD:SEPRO
SPYWARE:AD:ADTOOLS
SPYWARE:AD:HOTBAR
SPYWARE:AD:TOPICKS
SPYWARE:AD:SHOPATHOMESELECT
SPYWARE:AD:NICTECH-BM2
SPYWARE:AD:VX2-LOCALNRD
SPYWARE:AD:PALTALK
SPYWARE:AD:LORDOFSEARCH
SPYWARE:AD:GAMESPY-ARCADE
SPYWARE:AD:URLBLAZE
SPYWARE:AD:POWERSTRIP
SPYWARE:AD:TEOMA
SPYWARE:AD:DOGPILETOOLBAR
SPYWARE:AD:PEOPLEONPAGE
SPYWARE:AD:ADBARS
SPYWARE:AD:GIRAFATOOLBAR
SPYWARE:AD:SSSPIDER
SPYWARE:AD:VEGASPALMSCASINO
SPYWARE:AD:WUPD-MEDIAACCESS
SPYWARE:AD:ADSTART
SPYWARE:AD:DIYBAR
SPYWARE:AD:FREEDOWNLOADMANAGER
SPYWARE:AD:WEBCPR
SPYWARE:AD:EZTRACKS
SPYWARE:AD:BESTOFFERS
SPYWARE:AD:WINADISCOUNT
SPYWARE:AD:ADCLICKER-EJ
SPYWARE:AD:2MFREEGAMES
SPYWARE:AD:NETPUMPER126
SPYWARE:AD:EMPIREPOKER
SPYWARE:AD:ZAMINGO
SPYWARE:AD:SNAPULTRASEARCH136
SPYWARE:AD:ZANGOTOOLBAR
SPYWARE:AD:GEOMUNDOSTOOLBAR
SPYWARE:AD:WEBSEARCH
SPYWARE:AD:ACCESSIBILITYTOOLBAR
SPYWARE:AD:GOLDRIVIERACASINO
SPYWARE:AD:DESKTOPMEDIA
SPYWARE:AD:IZITOTOOLBAR
SPYWARE:AD:FREESCRATCHANDWIN
SPYWARE:AD:SIMBAR
SPYWARE:AD:SUPERFASTMP3SEARCH
SPYWARE:AD:EARTHLINKTOOLBAR
SPYWARE:AD:ADULTP2P_1_5
SPYWARE:AD:JILYIETOOLBAR
SPYWARE:AD:LIVEPROTECTION
SPYWARE:AD:ELITE_PROTECTOR
SPYWARE:AD:SUNSHINESPY_1_0
SPYWARE:AD:VIRUSPROTECTPRO37
SPYWARE:AD:INSTANTBUZZ
SPYWARE:AD:DELFINMEDIAVIEWER
SPYWARE:AD:COMODOTOOLBAR
SPYWARE:AD:DOWNLOADRECEIVER
SPYWARE:AD:TARGETSAVER

SPYWARE:BH

SPYWARE:BH:DREAMBAR
SPYWARE:BH:BAIDU_TOOLBAR_4_9_4
SPYWARE:BH:STARTNOW
SPYWARE:BH:SIDESTEP
SPYWARE:BH:SEARCHFORIT
SPYWARE:BH:DAOSEARCH
SPYWARE:BH:CNSMIN-3721
SPYWARE:BH:QCBAR
SPYWARE:BH:NAVEXCEL-HELPER
SPYWARE:BH:ZEROPOPUP
SPYWARE:BH:WISHBONE
SPYWARE:BH:PUSHTOOLBAR
SPYWARE:BH:ILOOKUP
SPYWARE:BH:BLAZEFIND
SPYWARE:BH:YOURSITEBAR
SPYWARE:BH:123MANIA
SPYWARE:BH:ABLE2KNOWTOOLBAR
SPYWARE:BH:SPOTON
SPYWARE:BH:CWS-GONNASEARCH
SPYWARE:BH:EXCITESEARCHBAR
SPYWARE:BH:THECOOLBAR
SPYWARE:BH:INTERNETOPTIMIZER
SPYWARE:BH:ISTSLOTCHBAR
SPYWARE:BH:CWS-CAMEUP
SPYWARE:BH:NAVEXCEL
SPYWARE:BH:SOFA_TOOLBAR
SPYWARE:BH:LOOKTHRUBAR
SPYWARE:BH:COUPONBAR
SPYWARE:BH:2ND-THOUGHT
SPYWARE:BH:ABCSEARCH
SPYWARE:BH:OEMJIBAR
SPYWARE:BH:EXACTSEEK
SPYWARE:BH:ADTRAFFIC
SPYWARE:BH:MAPSTANTOOLBAR
SPYWARE:BH:FFINDER
SPYWARE:BH:NEED2FIND
SPYWARE:BH:CWSSTARTPAGE-2
SPYWARE:BH:COOLSEARCH
SPYWARE:BH:QMTOOLBAR
SPYWARE:BH:VIPNETLINK
SPYWARE:BH:EZGREETS-TOOLBAR
SPYWARE:BH:MYFUNCARDS
SPYWARE:BH:BLUEWAVEADULTLINK-TB
SPYWARE:BH:SOGOU
SPYWARE:BH:SEARCHESSISTANT
SPYWARE:BH:8848
SPYWARE:BH:SEARCHSQUIRE
SPYWARE:BH:BAZOOKABAR
SPYWARE:BH:DIGITALNAMES
SPYWARE:BH:RICERCADOPPIA
SPYWARE:BH:FREECRUISE-TB
SPYWARE:BH:EXTREME-BIZ
SPYWARE:BH:SEARCHNUGGET
SPYWARE:BH:CNNICUPDATE
SPYWARE:BH:PERSONALWEB
SPYWARE:BH:SCNTOOLBAR
SPYWARE:BH:IMESHMEDIABAR
SPYWARE:BH:3SEARCH
SPYWARE:BH:MORPHEUS-TOOLBAR
SPYWARE:BH:NEWDOTNETQUICKSEARCH
SPYWARE:BH:GRALICWRAP
SPYWARE:BH:SEXYVIDEOSCREENSAVER
SPYWARE:BH:SIDEFIND-1-0
SPYWARE:BH:RABIO42
SPYWARE:BH:WOWOK-MP3
SPYWARE:BH:411WEBTOOLBAR
SPYWARE:BH:ONESTEPSEARCH10118
SPYWARE:BH:EXTRATOOLBAR10
SPYWARE:BH:SOSOTOOLBAR
SPYWARE:BH:SBUHOTBAR484
SPYWARE:BH:MUSICSTARWARETOOL
SPYWARE:BH:PROVENTACTICS35
SPYWARE:BH:LOOKQUICK
SPYWARE:BH:LOOKSTER
SPYWARE:BH:KWORD-INTERKEY
SPYWARE:BH:KOMPASS-TOOLBAR
SPYWARE:BH:SEARCH4TOP
SPYWARE:BH:PHAZEBAR
SPYWARE:BH:DEEPDO_TOOLBAR
SPYWARE:BH:PEOPLE_PAL_6_6
SPYWARE:BH:EZ_TRACKS_TOOLBAR
SPYWARE:BH:HDT_BAR
SPYWARE:BH:SWBAR-ADROAD-CPR
SPYWARE:BH:FUNWEBPRODUCTS
SPYWARE:BH:LYCOSSIDESEARCH
SPYWARE:BH:HITHOPPER
SPYWARE:BH:YELLOWPAGES
SPYWARE:BH:LOCATORSTOOLBAR
SPYWARE:BH:RX-TOOLBAR
SPYWARE:BH:FREEZE-COM
SPYWARE:BH:MICROGRAMING
SPYWARE:BH:IMESHBAR
SPYWARE:BH:SNAPTOOLBAR
SPYWARE:BH:DEALIO_TOOLBAR
SPYWARE:BH:SPYNOVA
SPYWARE:BH:FLASHBAR
SPYWARE:BH:GETMIRAR
SPYWARE:BH:YOKSUPERSEARCH
SPYWARE:BH:STUMBLEUPON
SPYWARE:BH:HOTBAR100368
SPYWARE:BH:ABOUTBLANK

SPYWARE:BP

SPYWARE:BP:IEPLUGIN
SPYWARE:BP:MIRARTOOLBAR
SPYWARE:BP:NEWNET
SPYWARE:BP:SMILEYCENTRAL
SPYWARE:BP:INTERNETMARKETINGBAR
SPYWARE:BP:MACHERSTOOLBAR
SPYWARE:BP:BAIGOO
SPYWARE:BP:RUSSIAN-SEARCHBAR
SPYWARE:BP:BYDOU
SPYWARE:BP:HAPPYTOFIND
SPYWARE:BP:BROWSERACCELERATOR30
SPYWARE:BP:UPLINK
SPYWARE:BP:IECODEC
SPYWARE:BP:DITTO_TOOLBAR
SPYWARE:BP:ZQUEST-COOKIE
SPYWARE:BP:BYSOO
SPYWARE:BP:WILDTANGENT
SPYWARE:BP:ETCETERASEARCH
SPYWARE:BP:COMETCURSOR

SPYWARE:DIALER

SPYWARE:DIALER:PLUGINACCESS
SPYWARE:DIALER:EASYDATES
SPYWARE:DIALER:YEAKNET
SPYWARE:DIALER:TIB-PORN-DIALER
SPYWARE:DIALER:STRIPPLAYER
SPYWARE:DIALER:IEACCESS

SPYWARE:DM

SPYWARE:DM:ALEXA-TOOLBAR
SPYWARE:DM:BRIDALBASICS
SPYWARE:DM:MYNAPSTER
SPYWARE:DM:TRUSTYFILES
SPYWARE:DM:POPULARSCREENSAVERS
SPYWARE:DM:SLINKYSLATETOOLBAR
SPYWARE:DM:KONTIKI
SPYWARE:DM:ALTNET-VAR1
SPYWARE:DM:DWN-ARL
SPYWARE:DM:WEBHANCER

SPYWARE:GM

SPYWARE:GM:DOTCOMTOOLBAR
SPYWARE:GM:TWISTER
SPYWARE:GM:VIRTUALBOUNCER
SPYWARE:GM:SAH-CASHBACK
SPYWARE:GM:MYSPACEBARIE
SPYWARE:GM:SONGOOG
SPYWARE:GM:ALBUMGALAXY
SPYWARE:GM:SPYSHERIFF
SPYWARE:GM:SEARCHBOSS
SPYWARE:GM:SONYROOTKIT
SPYWARE:GM:ZANGO-EASY-MESSENGER
SPYWARE:GM:SPYWARESTORMER
SPYWARE:GM:ERRORSAFE
SPYWARE:GM:VMNTOOLBAR16
SPYWARE:GM:UFIXER2007
SPYWARE:GM:IOWAWEBDOWNLOADER
SPYWARE:GM:SPYWARELOCKED33
SPYWARE:GM:SPYDAWN
SPYWARE:GM:CHILDWEBGUARDIAN
SPYWARE:GM:EXPERTANTIVIRUS41
SPYWARE:GM:NETCRAFTTOOLBAR
SPYWARE:GM:SPYWAREQUAKE
SPYWARE:GM:RELEVANTKNOWLEDGE
SPYWARE:GM:WEBSITELOGGER34
SPYWARE:GM:PCAST
SPYWARE:GM:TROJ-SPYWAD-X
SPYWARE:GM:EDONKEY2000

SPYWARE:KL

SPYWARE:KL:ELITEKEYLOGGER
SPYWARE:KL:FKWP-KEYLOGGER
SPYWARE:KL:SPYLANTERNKEYLOGGER
SPYWARE:KL:ACTIVEKEYLOGGERHOME
SPYWARE:KL:PERFECTKEYLOGGER-FTP
SPYWARE:KL:ACTIVEKEYLOGGER
SPYWARE:KL:CAM2FTP
SPYWARE:KL:NETTRACK-SPY
SPYWARE:KL:KGBKEYLOGGER
SPYWARE:KL:XPCSPY-FTP
SPYWARE:KL:SPYOUTSIDE-SMTP
SPYWARE:KL:007SPYSOFTWARE-FTP
SPYWARE:KL:HACKERWACKER
SPYWARE:KL:WINTECTIVE
SPYWARE:KL:PROAGENT
SPYWARE:KL:ELGOLF
SPYWARE:KL:MASSCONNECT
SPYWARE:KL:STARLOGGER
SPYWARE:KL:SC-KEYLOG
SPYWARE:KL:WINSPY
SPYWARE:KL:CODENAMEALVIN
SPYWARE:KL:LTTLOGGER
SPYWARE:KL:EMAILSPYMONITOR_6_9
SPYWARE:KL:COMPUTERMONITOR_1_1
SPYWARE:KL:ADVANCEDSPY_4
SPYWARE:KL:MYBRKEYLOGGER
SPYWARE:KL:XP-ADVANCEDKEYLOGGER
SPYWARE:KL:ACTIVEKEYLOGGER_392
SPYWARE:KL:BEEE
SPYWARE:KL:LOGIT10
SPYWARE:KL:LANTERNKEYLOGGER_6
SPYWARE:KL:WINFAMILYSAFETY
SPYWARE:KL:ARDAMAXKLOGGER28
SPYWARE:KL:MG-SHADOW20
SPYWARE:KL:APLUSKEYLOGGER
SPYWARE:KL:FINDNOT_GUARDOG
SPYWARE:KL:WINVESTIGATOR
SPYWARE:KL:SMART_PC_KEYLOGGER
SPYWARE:KL:ACTIVITY-LOGGER
SPYWARE:KL:GURLWATCH
SPYWARE:KL:DESKTOPSCOUT
SPYWARE:KL:FARSIGHTER
SPYWARE:KL:ESURVEILLER
SPYWARE:KL:COMPUTERSPY
SPYWARE:KL:STEALTHACTREPORTER
SPYWARE:KL:BOSSEVERYWARE
SPYWARE:KL:FEARLESSKEYSPY
SPYWARE:KL:PC-PARENT
SPYWARE:KL:DREAMSCAPEKEYLOGGER
SPYWARE:KL:LITTLEWITCHKEYLOGGER
SPYWARE:KL:PCACTMONPRO
SPYWARE:KL:ADVCMPMONITOR
SPYWARE:KL:KEYSPYWARE
SPYWARE:KL:ADVANCEDKEYLOGGER
SPYWARE:KL:SUPREMESPY
SPYWARE:KL:RADARSPY-10
SPYWARE:KL:BEYOND-KEYLOGGER-FTP
SPYWARE:KL:PAGKEYLOG
SPYWARE:KL:SYSTEMSURVEILLANCE
SPYWARE:KL:NICESPY
SPYWARE:KL:EMAILSPYPRO
SPYWARE:KL:ALLINONEKEYLOGGER
SPYWARE:KL:POWERSPY
SPYWARE:KL:SPYTECTOR131
SPYWARE:KL:GHOSTKEYLOGGER
SPYWARE:KL:SPYGRAPHICAPRO
SPYWARE:KL:KEYSPY
SPYWARE:KL:BEYONDKEYLOGGER_SMTP
SPYWARE:KL:WIN32.REMOTEKEYLOG.B
SPYWARE:KL:SSKC20
SPYWARE:KL:COMPUTERMONITORKL
SPYWARE:KL:APOPHISSPY10
SPYWARE:KL:PC-BLACK-BOX
SPYWARE:KL:STARR
SPYWARE:KL:SYSTEMSLEUTH
SPYWARE:KL:PERFECTKEYLOGGER168
SPYWARE:KL:POWEREDKEYLOGGER-2-2
SPYWARE:KL:BASP-PRO-4
SPYWARE:KL:MSN-SPY-MONITOR
SPYWARE:KL:KEYLOGGERKINGHOME32
SPYWARE:KL:OVERSPY
SPYWARE:KL:ACESPY
SPYWARE:KL:WATCHDOG
SPYWARE:KL:SPYBUDDY372
SPYWARE:KL:WEBMAILSPY
SPYWARE:KL:007SPYSOFTWARE-SMTP
SPYWARE:KL:KEYLOGGERPRO
SPYWARE:KL:EYESPYPRO
SPYWARE:KL:PCSENTINELSOFTWAREKL
SPYWARE:KL:ARDAMAXKEYLOGGER
SPYWARE:KL:DESKTOPDETECTIVE
SPYWARE:KL:NETVIZOR52
SPYWARE:KL:ACTIVITYKEYLOGGER
SPYWARE:KL:INWEBSITELOG24
SPYWARE:KL:SYS-KEYLOG-1-3
SPYWARE:KL:COMPUTERKEYLOGGER
SPYWARE:KL:SPYOUTSIDE-FTP
SPYWARE:KL:ACTIVITYMONITOR
SPYWARE:KL:ACTUALSPY
SPYWARE:KL:NETOBSERVE

SPYWARE:RAT

SPYWARE:RAT:SPYAGENT
SPYWARE:RAT:DATARAPE10F-GETPWD
SPYWARE:RAT:NETDEMON1-0
SPYWARE:RAT:ANALRAPE-ICQ-NOTIFY
SPYWARE:RAT:FEAR2-0
SPYWARE:RAT:BOBO
SPYWARE:RAT:PCACMEPRO
SPYWARE:RAT:INCOMMAND
SPYWARE:RAT:ACTMONMONITORING
SPYWARE:RAT:SHNAPPZHTTPRAT
SPYWARE:RAT:THEEF-2.0-CGI
SPYWARE:RAT:ARCANUM-0-1-1
SPYWARE:RAT:FADE1-0-TCP
SPYWARE:RAT:FADE1-0-HTTP
SPYWARE:RAT:ROACH10-INITIALRESP
SPYWARE:RAT:THEEF-2-0-ICQ
SPYWARE:RAT:STEALTHREDIR-TCP
SPYWARE:RAT:STEALTHREDIR-FTP
SPYWARE:RAT:HATREDFRIEND-TCP
SPYWARE:RAT:CIA1-22-ICQ
SPYWARE:RAT:CIA1-22-HTTP
SPYWARE:RAT:BIONET-TCP
SPYWARE:RAT:PRORAT1-9-ICQ
SPYWARE:RAT:CIA1-22-FTP
SPYWARE:RAT:ABACAB-HTTP
SPYWARE:RAT:MASTER
SPYWARE:RAT:FORCEDCONTROL
SPYWARE:RAT:DIEMSMUTTER
SPYWARE:RAT:COOLREMOTECONTROL
SPYWARE:RAT:SMALLUPLOADER
SPYWARE:RAT:NETOPREMOTECONTROL
SPYWARE:RAT:ACIDDROP
SPYWARE:RAT:REMOTEHAVOC
SPYWARE:RAT:ACIDHEAD
SPYWARE:RAT:ANTILAMER
SPYWARE:RAT:HIDDENCAMERA
SPYWARE:RAT:ERAZER-ICQ
SPYWARE:RAT:BEAST202-ICQ
SPYWARE:RAT:ASSASSIN1-1-HTTP
SPYWARE:RAT:NEUROTICKAT1-3-ICQ
SPYWARE:RAT:DSKLITE1-0-ICQ
SPYWARE:RAT:CIA1-22-SMTP
SPYWARE:RAT:EXCEPTION1-0-HTTP
SPYWARE:RAT:SNIPERNET
SPYWARE:RAT:BIFROSE
SPYWARE:RAT:REMOTER
SPYWARE:RAT:MINIOBLIVION
SPYWARE:RAT:ANALFTP
SPYWARE:RAT:BUSCHTROMMEL1-22
SPYWARE:RAT:AIR
SPYWARE:RAT:REMOTE-ANYTHING
SPYWARE:RAT:NIGHTCREATURE
SPYWARE:RAT:MINIMO
SPYWARE:RAT:CYBERNETIC1-62
SPYWARE:RAT:BADRAT1-1
SPYWARE:RAT:OMERTA-V13
SPYWARE:RAT:AQUA-0-2
SPYWARE:RAT:BACKATTACK
SPYWARE:RAT:AMITIS
SPYWARE:RAT:NETCONTROLE3-0
SPYWARE:RAT:SOFTWARSHADOW-CTS
SPYWARE:RAT:HERMANUPLOADER-CTS
SPYWARE:RAT:HERMANUPLOADER-STC
SPYWARE:RAT:REMOTESTORM1-2STC
SPYWARE:RAT:REMOTESTORM1-2-CTS
SPYWARE:RAT:SOFTWARSHADOW-STC
SPYWARE:RAT:NTRC2000
SPYWARE:RAT:MINICOMMAND203-STC
SPYWARE:RAT:PRORAT1-9
SPYWARE:RAT:MINICOMMAND203-CTS
SPYWARE:RAT:BIONET
SPYWARE:RAT:CIA1-3
SPYWARE:RAT:SPECREM6-2-STC
SPYWARE:RAT:GREEKHACKERS1-1-STC
SPYWARE:RAT:SPECREM6-2-CTS
SPYWARE:RAT:NEUROTICKAT1-3-CTS
SPYWARE:RAT:SCHWINDLER1-82-STC
SPYWARE:RAT:SNID-X2-1-2C-CTS
SPYWARE:RAT:SCHWINDLER1-82-CTS
SPYWARE:RAT:LANFILTRATOR-SIN
SPYWARE:RAT:HVLRAT-530-STC
SPYWARE:RAT:HVLRAT-530-CTS
SPYWARE:RAT:SKYRATSHOW
SPYWARE:RAT:SNID-X2-1-2C-STC
SPYWARE:RAT:NEUROTICKAT1-3-STC
SPYWARE:RAT:ROACH1-0-CTS
SPYWARE:RAT:LANFILTRATOR1-1-STC
SPYWARE:RAT:ROACH1-0-STC
SPYWARE:RAT:GREEKHACKERS1-1-CTS
SPYWARE:RAT:LITTLEWITCHEXPLORER
SPYWARE:RAT:BEAST20X-CTS
SPYWARE:RAT:REMOTECONTROL-17
SPYWARE:RAT:COMA-CTS
SPYWARE:RAT:ALEXMESSOMALEX-CTS
SPYWARE:RAT:ASSASSIN-1-1STC
SPYWARE:RAT:FERAT1-00-STC
SPYWARE:RAT:HANUMAN
SPYWARE:RAT:BEAST202-STC
SPYWARE:RAT:BIONET405-CTS
SPYWARE:RAT:ASSASSIN1-1-CTS
SPYWARE:RAT:FERAT1-00-CTS
SPYWARE:RAT:BIONET405-STC
SPYWARE:RAT:FREAK
SPYWARE:RAT:CIA1-22
SPYWARE:RAT:ALEXMESSOMALEX-STC
SPYWARE:RAT:KATUX2-0-SERVER
SPYWARE:RAT:COMA-STC
SPYWARE:RAT:SHITHEEP
SPYWARE:RAT:BOSSWATCHER
SPYWARE:RAT:AMREMOTECLIENT1-1
SPYWARE:RAT:SCREENCONTROL10-CTS
SPYWARE:RAT:PHOENIX2-1-28
SPYWARE:RAT:FLUX
SPYWARE:RAT:SCREENCONTROL10-STC
SPYWARE:RAT:LAMESPY
SPYWARE:RAT:DIGITALUPLOAD
SPYWARE:RAT:SERVEME
SPYWARE:RAT:XHX1-6
SPYWARE:RAT:STRIKER1-0
SPYWARE:RAT:AUTOCRAT
SPYWARE:RAT:FATALWOUND
SPYWARE:RAT:HANKYPANKY
SPYWARE:RAT:JOKERSFTP
SPYWARE:RAT:EVILFTP
SPYWARE:RAT:CD-ROMTROJAN
SPYWARE:RAT:WINSHELL
SPYWARE:RAT:FREAK88DAS
SPYWARE:RAT:BIONET-FTP
SPYWARE:RAT:NETANGEL1-0-SIN
SPYWARE:RAT:BLUEFIRE-FTP
SPYWARE:RAT:SHNAPPZHTTPRAT-SMTP
SPYWARE:RAT:TRAITOR21
SPYWARE:RAT:WEBCAMTROJAN
SPYWARE:RAT:A-311DEATH
SPYWARE:RAT:SMARTHACKUPLOADER
SPYWARE:RAT:ANTIPC
SPYWARE:RAT:FAKE0-2
SPYWARE:RAT:96MM
SPYWARE:RAT:NETCONTROLTAKEOVER
SPYWARE:RAT:BSETROJAN
SPYWARE:RAT:RTB666
SPYWARE:RAT:YAT1-3
SPYWARE:RAT:SPYAGENT-FTP
SPYWARE:RAT:PCSHARE
SPYWARE:RAT:X2A
SPYWARE:RAT:SUPERSPY
SPYWARE:RAT:CHARON-1-0-3
SPYWARE:RAT:SUPERRA
SPYWARE:RAT:SPYONE-1-0
SPYWARE:RAT:RIX310
SPYWARE:RAT:SUPERVISORPLUS
SPYWARE:RAT:STATWIN
SPYWARE:RAT:DIGIWATCHER-2-32
SPYWARE:RAT:MITHRIL-1-45
SPYWARE:RAT:COOLCAT
SPYWARE:RAT:DSKLITE1-0
SPYWARE:RAT:HUNTERGOP
SPYWARE:RAT:NCPH
SPYWARE:RAT:SPYAGENT-ALERT
SPYWARE:RAT:FRAG-ROCK-2-0
SPYWARE:RAT:EXCEPTION1-0
SPYWARE:RAT:OMNIQUARD-IRC
SPYWARE:RAT:HORNET
SPYWARE:RAT:FORCE1-61
SPYWARE:RAT:MINICOMMAND203-ICQ
SPYWARE:RAT:NUCLEAR-RAT-6-21
SPYWARE:RAT:ROBO-HACK1-2
SPYWARE:RAT:LANFILTRATOR1-1-CTS
SPYWARE:RAT:BLUEFIRE
SPYWARE:RAT:SPYAGENT-SMTP
SPYWARE:RAT:NEUROTICKITTEN
SPYWARE:RAT:DWMREMOTECONTROL
SPYWARE:RAT:GH0ST

SPYWARE:TROJAN

SPYWARE:TROJAN:FKWP-WDOWNLOADER
SPYWARE:TROJAN:HTTPRAT
SPYWARE:TROJAN:HELIOS-ICQNOTIFY
SPYWARE:TROJAN:HATREDFIEND
SPYWARE:TROJAN:SINIQUE1-0
SPYWARE:TROJAN:LOKITECH
SPYWARE:TROJAN:FALLINGSTAR
SPYWARE:TROJAN:BLHOUSE
SPYWARE:TROJAN:3XBACKDOOR
SPYWARE:TROJAN:OUTBREAK
SPYWARE:TROJAN:SNOWDOOR
SPYWARE:TROJAN:G-SPOT
SPYWARE:TROJAN:HALFLIFEJACKER
SPYWARE:TROJAN:SILENTSPY
SPYWARE:TROJAN:SANDESA-ICQNOTIF
SPYWARE:TROJAN:ABWIZ-C
SPYWARE:TROJAN:SPAM-MAXY
SPYWARE:TROJAN:DOWNLOADER-ARM
SPYWARE:TROJAN:DOWNLOADER.AB
SPYWARE:TROJAN:UPNRUN-V10
SPYWARE:TROJAN:DOWNLOADER-YD
SPYWARE:TROJAN:APOFIS1.0
SPYWARE:TROJAN:BERSEK1.0
SPYWARE:TROJAN:CROSSBOW
SPYWARE:TROJAN:CYN21
SPYWARE:TROJAN:51D1B
SPYWARE:TROJAN:HAVRAT1.1
SPYWARE:TROJAN:AGENTWD
SPYWARE:TROJAN:YURI-1-2
SPYWARE:TROJAN:TROYA_1_4
SPYWARE:TROJAN:UNNAMED-BD
SPYWARE:TROJAN:BAC-GEN-E
SPYWARE:TROJAN:LITHIUM102
SPYWARE:TROJAN:THEEF210FTP
SPYWARE:TROJAN:THEEF210
SPYWARE:TROJAN:BIFROST121
SPYWARE:TROJAN:BANDOOK-1-35
SPYWARE:TROJAN:DOWNLOADERDELF
SPYWARE:TROJAN:RADMIN30
SPYWARE:TROJAN:SHARK232
SPYWARE:TROJAN:ACCESSREMOTEPC
SPYWARE:TROJAN:GENIE17
SPYWARE:TROJAN:HOTMAILHACKER5
SPYWARE:TROJAN:BACKORIFICE2006
SPYWARE:TROJAN:BLUEEYE10B
SPYWARE:TROJAN:EXPLOIT_1_4_5
SPYWARE:TROJAN:BACKLASH
SPYWARE:TROJAN:LETMERULE20-STC
SPYWARE:TROJAN:WEBDOWNLOADER
SPYWARE:TROJAN:EVILGOAT
SPYWARE:TROJAN:MOSUCKER3-0
SPYWARE:TROJAN:BRAINWIPER
SPYWARE:TROJAN:SNAKETROJAN
SPYWARE:TROJAN:DACRYPTIC
SPYWARE:TROJAN:BAROK
SPYWARE:TROJAN:MESSIAH2-0
SPYWARE:TROJAN:ERAZER
SPYWARE:TROJAN:LITTLEWITCH-CMD
SPYWARE:TROJAN:LETMERULE20-CTS
SPYWARE:TROJAN:AUTOSPY-STC
SPYWARE:TROJAN:AUTOSPY-CTS
SPYWARE:TROJAN:FUNFACTORY-STC
SPYWARE:TROJAN:CLANDESTINE
SPYWARE:TROJAN:PHANTOMFTP
SPYWARE:TROJAN:X-BKDR
SPYWARE:TROJAN:REVERSABLE
SPYWARE:TROJAN:ERASER
SPYWARE:TROJAN:THUZEROTOLERANCE
SPYWARE:TROJAN:HUE1-0
SPYWARE:TROJAN:COMANDO
SPYWARE:TROJAN:RAD1-2-3
SPYWARE:TROJAN:SINSTERLER
SPYWARE:TROJAN:GWBOY
SPYWARE:TROJAN:NETSHADOW
SPYWARE:TROJAN:ABACAB
SPYWARE:TROJAN:ACROPOLIS
SPYWARE:TROJAN:VOICESPY
SPYWARE:TROJAN:SEED1-0
SPYWARE:TROJAN:NETANGEL1-0
SPYWARE:TROJAN:WOLLF
SPYWARE:TROJAN:HRAT
SPYWARE:TROJAN:FUCKTROJAN
SPYWARE:TROJAN:TEQUILABANDITA
SPYWARE:TROJAN:INIKILLER
SPYWARE:TROJAN:NUCLEARUP
SPYWARE:TROJAN:ELFRAT
SPYWARE:TROJAN:DIMBUS
SPYWARE:TROJAN:HGZ
SPYWARE:TROJAN:MYDEMISE
SPYWARE:TROJAN:OPTIXLITE
SPYWARE:TROJAN:BANDOOK-V1-0
SPYWARE:TROJAN:DWNLDR-ARQ
SPYWARE:TROJAN:SUNSHADOW-1-70
SPYWARE:TROJAN:IEVA1.0
SPYWARE:TROJAN:ZSPYII0.99
SPYWARE:TROJAN:ZZMM20
SPYWARE:TROJAN:BOER
SPYWARE:TROJAN:WEBCENTER
SPYWARE:TROJAN:LAMERAT10
SPYWARE:TROJAN:ABREMOTEPRO31
SPYWARE:TROJAN:ACIDSHIVERS
SPYWARE:TROJAN:ONLY1RAT
SPYWARE:TROJAN:ACESSOR20
SPYWARE:TROJAN:ONE
SPYWARE:TROJAN:POISONIVY212
SPYWARE:TROJAN:NIRVANA-2.0
SPYWARE:TROJAN:LURKER11
SPYWARE:TROJAN:YKW375
SPYWARE:TROJAN:YXNETSCREEN20
SPYWARE:TROJAN:THEX-12
SPYWARE:TROJAN:WINSHADOW30
SPYWARE:TROJAN:WINEGGDROPSPRO
SPYWARE:TROJAN:X-DOOR
SPYWARE:TROJAN:TROLLA
SPYWARE:TROJAN:PSEUDORAT01B
SPYWARE:TROJAN:REVOPA
SPYWARE:TROJAN:Y3K2K5
SPYWARE:TROJAN:COBRAUPLOADER
SPYWARE:TROJAN:OPTIXPRO132
SPYWARE:TROJAN:FURAX10B3
SPYWARE:TROJAN:GLOBALKILLER-STC
SPYWARE:TROJAN:REMOTEHACK
SPYWARE:TROJAN:WINTERLOVE
SPYWARE:TROJAN:BLACKCURSE4
SPYWARE:TROJAN:WINICABRAS11
SPYWARE:TROJAN:ZALIVATOR142PRO
SPYWARE:TROJAN:DLOADERAGENT-TL
SPYWARE:TROJAN:DARKMOON-4-11
SPYWARE:TROJAN:KMSNRAT100
SPYWARE:TROJAN:TRAILOFDESTRUC20
SPYWARE:TROJAN:CROSSFIRESTROJAN
SPYWARE:TROJAN:CRASHCOOL-1-1
SPYWARE:TROJAN:SPYLPLY.A
SPYWARE:TROJAN:EVADE1-1B
SPYWARE:TROJAN:HELIOS-3-1-STC
SPYWARE:TROJAN:ZXSHELL

SPYWARE:UTIL

SPYWARE:UTIL:WEBFERRET
SPYWARE:UTIL:NUCLEARSCAN
SPYWARE:UTIL:SARIA
SPYWARE:UTIL:COPERNICMETABAR
SPYWARE:UTIL:AMPLIFYTOOLBAR
SPYWARE:UTIL:SPYBLOCS-EBLOCS
SPYWARE:UTIL:COPERNICAGENT
SPYWARE:UTIL:I2HUB
SPYWARE:UTIL:BOHAJER-DOWNLOADER
SPYWARE:UTIL:SPYWARESTRIKE
SPYWARE:UTIL:HIPPYNOTIFY20
SPYWARE:UTIL:SPAMBLOCKERUTILITY
SPYWARE:UTIL:SMARTBARXP

SSH

SSH:NON-STD-PORT
SSH:SYSAX-MULTI-SERVER-DOS
SSH:PRAGMAFORT-KEY-OF
SSH:BRUTE-LOGIN

SSH:AUDIT

SSH:AUDIT:UNEXPECTED-HEADER
SSH:AUDIT:SSH-V1

SSH:ERROR

SSH:ERROR:INVALID-HEADER
SSH:ERROR:COOKIE-MISMATCH
SSH:ERROR:MSG-TOO-LONG
SSH:ERROR:INVALID-PKT-TYPE
SSH:ERROR:MSG-TOO-SHORT

SSH:MISC

SSH:MISC:MAL-VERSION
SSH:MISC:EXPLOIT-CMDS-UNIX
SSH:MISC:UNIX-ID-RESP

SSH:OPENSSH

SSH:OPENSSH:BLOCK-DOS
SSH:OPENSSH:NOVEL-NETWARE
SSH:OPENSSH:GOODTECH-SFTP-BOF

SSH:OVERFLOW

SSH:OVERFLOW:SECURECRT-BOF
SSH:OVERFLOW:PUTTY-VER
SSH:OVERFLOW:FREESSHD-KEY-OF

SSL

SSL:UNK-HANDSHAKE-TYPE
SSL:SERIAL-NUM-TOO-LONG
SSL:SESSION-ID-LEN-2BIG
SSL:ENC-LEN-VALUE-TOO-BIG
SSL:MSG-IN-WRONG-DIR
SSL:ENC-TAG-VALUE-TOO-BIG
SSL:SERVR-CERT-FAILS-VALIDATION
SSL:SESSION-KEY-REUSE-UNAVAIL
SSL:CLNT-MSTR-KEY-OVERFLOW
SSL:UNK-CHG-CPHR-SPEC-MSG
SSL:CIPHER-SUITE-OVERFLOW
SSL:DTLS-DOS
SSL:HTTPS-UNIX-CMDS
SSL:HTTPS-UNIX-ID-RESP
SSL:DEFAULT-PW
SSL:MOZ-SSLV2-CL
SSL:MALFORMED-SCHANNEL-NEGO
SSL:SLAPPER-WORM-PROBE
SSL:UTN-USERFIRST-HARDWARE
SSL:THC-SSL-DOS
SSL:OPENSSL-FLOOD
SSL:OPENSSL-REC-HANDLING-DOS
SSL:OPENSSL-GET-KEY-EXCH-UAF
SSL:EGO-GOV-FRAUD-CERTIFICATE
SSL:TURKTRUST-FRAUD-CERTIFICATE
SSL:OPENSSL-AES-NI-INTUDF
SSL:DIGINOTAR-CERT-KEY-NEGO
SSL:MS-WINDOWS-TLS-BYPASS
SSL:SSLSCAN-ACTIVITY
SSL:APACHE-MOD-SSL
SSL:GNUTLS-TLS-RECORD-MC
SSL:OPENSSL-TLS-DOS
SSL:OPENSSL-DTLS-DOS
SSL:CPHR-DOS
SSL:OPENSSL-HEARTBEAT-ALTERNATE
SSL:MCAFEE-ASSET-MANAGER
SSL:X509-CN-NULL-BYTE
SSL:OPENSSL-TLS-DTLS-HEARTBEAT
SSL:APPLE-SSL-BYPASS
SSL:APPLE-SSL-BYPASS-PROXY

SSL:AUDIT

SSL:AUDIT:SESSION-KEY-REUSE
SSL:AUDIT:CERT-EXPIRED
SSL:AUDIT:KEY-RENEGOTIATION
SSL:AUDIT:HTTP-OVER-SSL
SSL:AUDIT:NOT-SSL
SSL:AUDIT:CERT-BIT-LT-2048

SSL:IIS

SSL:IIS:CERT-DOS

SSL:INVALID

SSL:INVALID:CERT-CHAIN
SSL:INVALID:CONTENT-TYPE
SSL:INVALID:COMP-METHOD
SSL:INVALID:VALIDITY-FMT
SSL:INVALID:SESSION-ID-LEN
SSL:INVALID:CERT-VERSION
SSL:INVALID:SVR-HELLO-FMT
SSL:INVALID:MESSAGE-FMT
SSL:INVALID:CLIENT-HELLO
SSL:INVALID:COMP-METH-LEN
SSL:INVALID:CHALLENGE-LEN
SSL:INVALID:CIPHER-SPEC
SSL:INVALID:SVR-HELLO-DATA
SSL:INVALID:CIPHER-SUITE
SSL:INVALID:CIPHER-LEN
SSL:INVALID:CERT-FORMAT
SSL:INVALID:NULL-CERT
SSL:INVALID:SSL-INV-VER
SSL:INVALID:GNUTLS-RECORD-BO

SSL:OVERFLOW

SSL:OVERFLOW:SSL-KEY_ARG2
SSL:OVERFLOW:SSL-KEY_ARG1
SSL:OVERFLOW:BEA-PLUGINS-CERT
SSL:OVERFLOW:KEY-ARG-NO-ENTROPY
SSL:OVERFLOW:X509-OBJ-ID-OV
SSL:OVERFLOW:CIPHERS-OBO
SSL:OVERFLOW:CIPHERS-OF

SSL:VULN

SSL:VULN:MOZILLA-NSS-REG

SYSLOG

SYSLOG:SYSLOG-CRAFTED-PKT
SYSLOG:CP-SYSLOGD-ESC
SYSLOG:HP-MGMT-IMCSYSLOGDM-UAF
SYSLOG:RSYSLOG-BO

SYSLOG:AUDIT

SYSLOG:AUDIT:MISSING-TS
SYSLOG:AUDIT:INVALID-MONTH
SYSLOG:AUDIT:INVALID-DAY
SYSLOG:AUDIT:TIMESTAMP
SYSLOG:AUDIT:INVALID-PRIORITY
SYSLOG:AUDIT:EMPTY-PRI
SYSLOG:AUDIT:PACKET
SYSLOG:AUDIT:MISSING-PRI

SYSLOG:FAILURES

SYSLOG:FAILURES:UNEXP-REPLY
SYSLOG:FAILURES:MSG-TOO-SHORT
SYSLOG:FAILURES:EMPTY-MSG
SYSLOG:FAILURES:MSG-TOO-LONG

SYSLOG:FORMAT

SYSLOG:FORMAT:PRI-TOO-LONG
SYSLOG:FORMAT:PRIORITY

TCP:AMBIGUOUS

TCP:AMBIGUOUS:WSF-TOOBIG

TCP:AUDIT

TCP:AUDIT:S2C-LASTACK-ACK
TCP:AUDIT:C2S-URG-DATA
TCP:AUDIT:SYN-RTNS-BADWIN
TCP:AUDIT:C2S-RST-DATA
TCP:AUDIT:OPT-UNSUP
TCP:AUDIT:C2S-FINRETR-BADSEQ
TCP:AUDIT:S2C-SYN-RST
TCP:AUDIT:SYNSENT-NONSYN
TCP:AUDIT:UNSOL-WSF
TCP:AUDIT:C2S-PART-OUT-OF-WIN
TCP:AUDIT:SYN-RTNS-BADTS
TCP:AUDIT:S2C-RST-DATA
TCP:AUDIT:S2C-OLD-ESTB
TCP:AUDIT:SYN-RTNS-BADISS
TCP:AUDIT:OPTIONS-UNNEGOT-SACK
TCP:AUDIT:C2S-CLOSED-ACK
TCP:AUDIT:C2S-LASTACK-ACK
TCP:AUDIT:SYNSENT-RST
TCP:AUDIT:SYNRCVD-SYNACK
TCP:AUDIT:C2S-TIMEWAIT-ACK
TCP:AUDIT:C2S-TIMEWAIT-FIN
TCP:AUDIT:C2S-OLD-ESTB
TCP:AUDIT:C2S-SEG-OUT-OF-WIN
TCP:AUDIT:NONSYN-SACKPERM
TCP:AUDIT:UNKNOWN
TCP:AUDIT:OPTIONS-UNNEGOT-TS
TCP:AUDIT:WRONG-CHECKSUM
TCP:AUDIT:BAD-SYN-NONSYN
TCP:AUDIT:S2C-SIMUL-SYN
TCP:AUDIT:S2C-FINRETR-BADSEQ
TCP:AUDIT:OPT-UNSOL-TS
TCP:AUDIT:S2C-FINWAIT2-FIN
TCP:AUDIT:S2C-TIMEWAIT-FIN
TCP:AUDIT:S2C-TIMEWAIT-ACK
TCP:AUDIT:S2C-SEG-OUT-OF-WIN
TCP:AUDIT:S2C-FIN-OUT-OF-WIN
TCP:AUDIT:S2C-PART-OUT-OF-WIN
TCP:AUDIT:C2S-FUTURE-ACK
TCP:AUDIT:UNSOL-SACKPERM
TCP:AUDIT:S2C-FUTURE-ACK
TCP:AUDIT:OLD-SYNACK
TCP:AUDIT:SYN-RTNS--BADWSF
TCP:AUDIT:OLD-3WH-ACK

TCP:C2S:AMBIG

TCP:C2S:AMBIG:SYN-RTNS--BADSACK
TCP:C2S:AMBIG:C2S-SYN-DATA
TCP:C2S:AMBIG:OLAP-MISMATCH

TCP:C2S:ERROR

TCP:C2S:ERROR:REASS-LOST-TRACK

TCP:C2S:EVASION

TCP:C2S:EVASION:C2S-URG-OUT-WIN
TCP:C2S:EVASION:C2S-ESTB-SYN

TCP:C2S:EXPLOIT

TCP:C2S:EXPLOIT:RST-BRUTE-FORCE
TCP:C2S:EXPLOIT:TCP-ZERO-PORT
TCP:C2S:EXPLOIT:URG-WO-FLG
TCP:C2S:EXPLOIT:C2S-URG-OVERLAP

TCP:C2S:FLAGSERROR

TCP:C2S:FLAGSERROR:DIRTY-SYN

TCP:C2S:INFO

TCP:C2S:INFO:C2S-FIN-OUT-OF-WIN

TCP:ERROR

TCP:ERROR:REASS-MEMORY-OVERFLOW
TCP:ERROR:FLOW-MEMORY-EXCEEDED

TCP:EXPLOIT

TCP:EXPLOIT:SOCKSTRESS

TCP:OPTERR

TCP:OPTERR:BAD-OPTION
TCP:OPTERR:TOO-LONG
TCP:OPTERR:NONSYN-WSF
TCP:OPTERR:SYN-SACK
TCP:OPTERR:SHORT-READ
TCP:OPTERR:BAD-LENGTH
TCP:OPTERR:ZERO-LENGTH
TCP:OPTERR:NONSYN-MSS
TCP:OPTERR:MS-ORPHAN-CONNECTION
TCP:OPTERR:MS-ZERO-WINDOW-SIZE

TCP:S2C:AMBIG

TCP:S2C:AMBIG:OLAP-MISMATCH

TCP:S2C:ERROR

TCP:S2C:ERROR:REASS-LOST-TRACK

TCP:S2C:EVASION

TCP:S2C:EVASION:S2C-URG-OUT-WIN
TCP:S2C:EVASION:S2C-ESTB-SYN

TCP:S2C:EXPLOIT

TCP:S2C:EXPLOIT:S2C-URG-OVERLAP
TCP:S2C:EXPLOIT:URG-WO-FLAGS

TCP:S2C:FLAGSERROR

TCP:S2C:FLAGSERROR:DIR-SYNACK

TCP:S2C:INFO

TCP:S2C:INFO:S2C-URG-DATA

TELNET:AUDIT

TELNET:AUDIT:USER
TELNET:AUDIT:REQ-SUBNEG-UNKNOWN

TELNET:CMD

TELNET:CMD:CAT-ETC-PASSWD
TELNET:CMD:HALT
TELNET:CMD:ALLIED-TELESIS-PRIV
TELNET:CMD:SCRIPT-TAGS-STREAM

TELNET:DOS

TELNET:DOS:GAMSOFT

TELNET:EXPLOIT

TELNET:EXPLOIT:SGI-RLD
TELNET:EXPLOIT:RESOLV-HOST-CONF
TELNET:EXPLOIT:LD-LIBRARY-PATH
TELNET:EXPLOIT:MIT-KERB-DASH-E
TELNET:EXPLOIT:SOL-AUTH-BYPASS
TELNET:EXPLOIT:LD-PRELOAD
TELNET:EXPLOIT:SOLARIS-LOGIN-OF
TELNET:EXPLOIT:MS-CREDENTIAL
TELNET:EXPLOIT:SUN-TELNETD-OF

TELNET:FAILURE

TELNET:FAILURE:BRUTE-FORCE
TELNET:FAILURE:WINDOWS
TELNET:FAILURE:GUEST
TELNET:FAILURE:NOT-ON-CONSOLE
TELNET:FAILURE:LOGIN-INCORRECT
TELNET:FAILURE:NON-NTLM
TELNET:FAILURE:LOGIN-FAILED
TELNET:FAILURE:EMP-CISCO-PWD
TELNET:FAILURE:PERM-DENIED

TELNET:NEGOT

TELNET:NEGOT:REQ-SUBNEG-FORMAT

TELNET:OVERFLOW

TELNET:OVERFLOW:OPTION
TELNET:OVERFLOW:SUBOPTION
TELNET:OVERFLOW:LOGIN-OF
TELNET:OVERFLOW:SGI
TELNET:OVERFLOW:YBSD-OF-CHECK
TELNET:OVERFLOW:ABSOLUTE-UK2-OF
TELNET:OVERFLOW:OPTIONS-REPLY
TELNET:OVERFLOW:CCPROXY-HOST-OF
TELNET:OVERFLOW:LINEMODE-OF
TELNET:OVERFLOW:NEW-ENVIRON-OF
TELNET:OVERFLOW:BSD-ENCRY-KEYID

TELNET:SVRRESP

TELNET:SVRRESP:MS-CLIENT-INFO

TELNET:USER

TELNET:USER:DEFAULT-PW-2
TELNET:USER:DEFAULT-PW
TELNET:USER:DEFAULT-PW-NORTEL
TELNET:USER:DEFAULT-PW-3
TELNET:USER:OUTOFBOX
TELNET:USER:ROOT
TELNET:USER:EZSETUP
TELNET:USER:APC-BACKDOOR
TELNET:USER:DYNALINK-BACKDOOR
TELNET:USER:AXIS-COPYRIGHT
TELNET:USER:DEFAULT-PW-4
TELNET:USER:DEFAULT-PW-3COM
TELNET:USER:4DGIFTS

TFTP

TFTP:EMPTY-FILENAME
TFTP:MISSING-MODE
TFTP:MISSING-FILENAME
TFTP:MSG-TOO-SHORT
TFTP:MSG-TOO-LONG
TFTP:FNAME-NOT-T2
TFTP:FILENAME-TOO-LONG
TFTP:FS-FILE
TFTP:SERVER-ERROR-BO
TFTP:TRANSPORT-BOF
TFTP:WVFTP-OPTION-OF
TFTP:MRIS-ACCESS-VIOLATE
TFTP:QUICK-SERVER-FILENAME-DOS

TFTP:AUDIT

TFTP:AUDIT:C2S-UNEXP-DATA
TFTP:AUDIT:S2C-INVALID-OPCODE
TFTP:AUDIT:WRITE-FAILED
TFTP:AUDIT:READ-FAILED
TFTP:AUDIT:S2C-UNEXP-DATA
TFTP:AUDIT:S2C-UNEXP-ACK
TFTP:AUDIT:C2S-INVALID-OPCODE
TFTP:AUDIT:C2S-UNEXP-ACK

TFTP:DIRECTORY

TFTP:DIRECTORY:DOT-DOT
TFTP:DIRECTORY:ROOT
TFTP:DIRECTORY:SOLAR-TFTP-TRVRS

TFTP:FILE

TFTP:FILE:PASSWD-MAKREC
TFTP:FILE:ADMIN-DLL

TFTP:OPERATION

TFTP:OPERATION:FS-TFTP-OF
TFTP:OPERATION:GET
TFTP:OPERATION:WRITE

TFTP:OVERFLOW

TFTP:OVERFLOW:MODE-TOO-LONG

TFTP:REQUEST

TFTP:REQUEST:NULL-PTR

TIP

TIP:RECONNECT
TIP:INV-IDENTIFY-RESP

TROJAN

TROJAN:PUSHDO-ACTIVITY
TROJAN:EAGHOUSE
TROJAN:BLEEDING-LIFE-EK
TROJAN:WALDEC-ACTIVITY
TROJAN:FAKE-AV-CO-CC
TROJAN:CAPFIRE4-CNC
TROJAN:WIPER-FLAME-UPDATE
TROJAN:BYTE-VERIFY-HTML
TROJAN:CFM-UFO
TROJAN:GUPTACHAR-2.0
TROJAN:HXDEF1.00
TROJAN:MITGLEIDER
TROJAN:PEACOMM-TROJAN
TROJAN:POISONIVY-CNC
TROJAN:THE-RAT
TROJAN:ASPXSPY-ACTIVITY
TROJAN:SAKURA-1.1-ARCH-REQ
TROJAN:GOZI-REG
TROJAN:SAKURA-BIN-DOWNLOAD
TROJAN:PROFTPD-BACKDOOR
TROJAN:SAKURA-LANDING-OBFUS
TROJAN:OSX-DNS-CHANGER
TROJAN:PROFTPD-BACKDOOR-BEACON
TROJAN:FISP-A-BOOTKIT
TROJAN:DUO-USB
TROJAN:SAKURA-LANDING-REQ
TROJAN:DLINK-BACKDOOR
TROJAN:BACKDOOR-LEOUNCIA
TROJAN:DROIDDREAM
TROJAN:DEADBEEF-CNC
TROJAN:ITSOKNOPROBLEMBRO-CNC
TROJAN:R2D2
TROJAN:BOT-FEODO-ACTIVITY
TROJAN:JECT.A
TROJAN:ALDIBOT-DETECTION
TROJAN:SPYEYE-BEACON
TROJAN:EBURY-DNS-EXFILTRATION
TROJAN:ZEROACCESS-BOTNET-P2P
TROJAN:CVE-2013-3893-CNC
TROJAN:ENFAL-LURID-CNC
TROJAN:TAIDOOR-CNC
TROJAN:APT1-SSL-YAHOO
TROJAN:APT1-SSL-WEBMAIL
TROJAN:APT1-SSL-IBM
TROJAN:APT1-SSL-NO-NAME
TROJAN:CITADEL-BEACON
TROJAN:APT1-SSL-AOL
TROJAN:APT1-SSL-MOON-NIGHT
TROJAN:APT1-SSL-SUR
TROJAN:APT1-SSL-VIRTUALLYTHERE
TROJAN:APT1-SSL-NS
TROJAN:APT1-SSL-EMAIL
TROJAN:APT1-SSL-SERVER
TROJAN:APT1-WEBC2-UGX-UA
TROJAN:HTRAN-UA
TROJAN:ANDROID-SPAMSOLDIER-BOT
TROJAN:APT1-WEBC2-CLOVER-UA
TROJAN:FAKE-MSIE-6.0-UA
TROJAN:RUN-FOREST-RUN
TROJAN:KAZY-BEACON
TROJAN:BLACKHOLE-KIT-URL-REQ
TROJAN:OPHIARU-BOTNET
TROJAN:APACHE-DARKLEECH
TROJAN:WIPER-FLAME-POST-EXFIL
TROJAN:APT1-SSL-LAME
TROJAN:APT1-SSL-ALPHA
TROJAN:APT1-WEBC2RAVE-TOSCTB-UA
TROJAN:PUSHDO-POST-CNC
TROJAN:MALVERTISING-CO-CC
TROJAN:NIGHT-DRAGON-CC
TROJAN:ASPXSPY-CONNECT
TROJAN:SAKURA-BIN-LOAD-REQ
TROJAN:SAFEPACK-PLUGIN-DETECT
TROJAN:APT1-WEBC2-DIV-UA
TROJAN:BACKDOOR-BY-ZOMBIE
TROJAN:SIMPLE-PHP-BACKDOOR
TROJAN:CDORKED-INFECTED-SERVER
TROJAN:EBURY-SSH-BACKDOOR
TROJAN:CDORKED-BACKDOOR

TROJAN:ADMW0RM

TROJAN:ADMW0RM:USER-LOGIN

TROJAN:AUTOPROXY

TROJAN:AUTOPROXY:INFECTED-HOST

TROJAN:BACKCONSTR

TROJAN:BACKCONSTR:FTP-ON
TROJAN:BACKCONSTR:FTP-PORT-OPEN
TROJAN:BACKCONSTR:CONNECTION

TROJAN:BACKDOOR

TROJAN:BACKDOOR:BANNER
TROJAN:BACKDOOR:PERL-SHELLBOT-S
TROJAN:BACKDOOR:PANDORA-DOS-CNC
TROJAN:BACKDOOR:MURCY-CNC
TROJAN:BACKDOOR:GHOSTNET-CNC

TROJAN:BACKORIFICE

TROJAN:BACKORIFICE:BO2K-CONNECT
TROJAN:BACKORIFICE:WEB-SERVER
TROJAN:BACKORIFICE:EXECUTION
TROJAN:BACKORIFICE:BOPING
TROJAN:BACKORIFICE:CONN-REQ

TROJAN:CDK

TROJAN:CDK:PORT79
TROJAN:CDK:PORT15858

TROJAN:COREFLOOD

TROJAN:COREFLOOD:C-AND-C
TROJAN:COREFLOOD:TRACKER-REQ

TROJAN:DAGGER

TROJAN:DAGGER:SERVER-RES
TROJAN:DAGGER:CLIENT-CONNECT

TROJAN:DOLY

TROJAN:DOLY:SERVER-RES-V2
TROJAN:DOLY:SERVER-RES-V1
TROJAN:DOLY:COMMAND-V1

TROJAN:DONALDDICK

TROJAN:DONALDDICK:SERVER-RES

TROJAN:GATECRASHER

TROJAN:GATECRASHER:SERVER-RES
TROJAN:GATECRASHER:GC-PROBE

TROJAN:GIRLFRIEND

TROJAN:GIRLFRIEND:SERVER-RES

TROJAN:INFECTOR

TROJAN:INFECTOR:CLIENT-REQ
TROJAN:INFECTOR:SVR-RES

TROJAN:MISC

TROJAN:MISC:AOLADMIN-SRV-RESP
TROJAN:MISC:ROOTBEER-CLIENT
TROJAN:MISC:WEBSERVCT10
TROJAN:MISC:GHOST-SRV-RESP
TROJAN:MISC:FRENZY-SRV-RESP
TROJAN:MISC:NETTAXI-SRV-RESP
TROJAN:MISC:CHUPA-COMMAND
TROJAN:MISC:SCHNECK-SERV-RESP
TROJAN:MISC:LITHIUM-SRV-RESP
TROJAN:MISC:LESZCZ-SRV-RESP
TROJAN:MISC:KONIK-CLIENT-REQ
TROJAN:MISC:UNDETECTED-SRV-RESP
TROJAN:MISC:MASSAKER-SRV-RESP
TROJAN:MISC:CELINE-SRV-RESP
TROJAN:MISC:TRUVA-SERV-RESP
TROJAN:MISC:SCARAB-CONNECT
TROJAN:MISC:INSANE-SRV-RESP
TROJAN:MISC:HOSTCONTROL-RESP
TROJAN:MISC:KIDTERROR-SRV-RESP
TROJAN:MISC:INTRUDER-RESPONSE
TROJAN:MISC:BASICHELL-SRV-RESP
TROJAN:MISC:AMANDA-SRV-RESP
TROJAN:MISC:BACKAGE-COMMAND
TROJAN:MISC:ASYLUM-COMMAND
TROJAN:MISC:BDDT-SRV-OK
TROJAN:MISC:BLACKANGEL-SRV-RESP
TROJAN:MISC:BF-EVOLUTION-BANNER
TROJAN:MISC:CAFEINI-SERV-RESP
TROJAN:MISC:BREACHPRO-CAP-REQ
TROJAN:MISC:BLADERUNNER-RESP
TROJAN:MISC:BREACH-SRV-RESP
TROJAN:MISC:ECLYPSE-SRV-RESP
TROJAN:MISC:BLAZER-SERV-RESP
TROJAN:MISC:DTR-BANNER
TROJAN:MISC:CGI-BUINET-SRV-RESP
TROJAN:MISC:FE-SERV-RESP
TROJAN:MISC:HACKWORLD-CMD
TROJAN:MISC:FORE-SRV-RESP
TROJAN:MISC:CYN-CLIENT-REQ
TROJAN:MISC:GIFT-COMMAND
TROJAN:MISC:DANTON-SVR-RESP
TROJAN:MISC:CRACKDOWN-SRV-RESP
TROJAN:MISC:DRAT-SRV-VERSION
TROJAN:MISC:INCOMMAND-SVR-VER
TROJAN:MISC:FBACKDOOR-SRV-RESP
TROJAN:MISC:GSPOT-COMMAND
TROJAN:MISC:DCONNECT
TROJAN:MISC:GIRLFRIEND-SRV-RESP
TROJAN:MISC:FILENAIL-REQUEST
TROJAN:MISC:XANADU111-CON
TROJAN:MISC:WOW23-TCP
TROJAN:MISC:VAGNCKER-SERV-RESP
TROJAN:MISC:WINRAT10-TCP
TROJAN:MISC:WINCRASH10-SRV-RDY
TROJAN:MISC:WANREMOTE-ADMIN
TROJAN:MISC:WINRAT12-TCP
TROJAN:MISC:WINMITE-SRV-RDY
TROJAN:MISC:WINCRASH
TROJAN:MISC:RUX-COMMAND
TROJAN:MISC:RPM-COMMAND
TROJAN:MISC:REMOTEHACK-CLIENTID
TROJAN:MISC:RULER-SERV-RESP
TROJAN:MISC:MAVERICKS-SRV-RESP
TROJAN:MISC:THING-SERV-RESP
TROJAN:MISC:OSIRIS-SERV-RESP
TROJAN:MISC:OXON-COMMAND
TROJAN:MISC:PITFALL-SERV-RESP
TROJAN:MISC:SONOFPW-SERV-RESP
TROJAN:MISC:NIRVANA-COMMAND
TROJAN:MISC:FLU-COMMAND
TROJAN:MISC:OBLIVION-SRV-RESP
TROJAN:MISC:PROJNEXT-SERV-RESP
TROJAN:MISC:PPORT-INFO-REQ
TROJAN:MISC:PHASE-ZERO-SRV-RESP
TROJAN:MISC:PSYCHWARD-SRV-RESP
TROJAN:MISC:NETSILENCE-SRV-RESP
TROJAN:MISC:PCINVADER-COMMAND
TROJAN:MISC:ONE-CLIENTID
TROJAN:MISC:R0XR4T-COMMAND
TROJAN:MISC:R3C-SERV-RESP
TROJAN:MISC:PROSIAK-SERV-RESP
TROJAN:MISC:REMOTEHACK-SVR-RESP
TROJAN:MISC:PHOENIX-SERV-RESP
TROJAN:MISC:RATHEAD-SRV-RESP
TROJAN:MISC:NOKNOK-COMMAND
TROJAN:MISC:PCINVADER-FTP-BANR
TROJAN:MISC:NETRAIDER-SRV-RESP
TROJAN:MISC:MNEAH-SERV-RESP
TROJAN:MISC:MOONPIE3-FTP-RESP
TROJAN:MISC:MEETLAMER-COMMAND
TROJAN:MISC:MOONPIE-SERV-RESP
TROJAN:MISC:MICHAL-SRV-RESP
TROJAN:MISC:NETSPY-SRV-RESP
TROJAN:MISC:MOSUCKER-SERV-RESP
TROJAN:MISC:MOBLIVION-SERV-RESP
TROJAN:MISC:TRANSSCOUT-CLIENTID
TROJAN:MISC:TRON-COMMAND
TROJAN:MISC:VOODOO-COMMAND
TROJAN:MISC:ULTORS-SERV-RESP
TROJAN:MISC:UPLOADER-LOGIN-REQ
TROJAN:MISC:LEGUARDIEN
TROJAN:MISC:SCHOOLBUS-JOYBD
TROJAN:MISC:RADMIN-CMD
TROJAN:MISC:OPTIX-PRO-CONN
TROJAN:MISC:EXECUTOR-CMD
TROJAN:MISC:ULTIMATERAT
TROJAN:MISC:GLACIER
TROJAN:MISC:LAST2K-CONN
TROJAN:MISC:TROJAN-CIA
TROJAN:MISC:CYN-CLIENT-CONN
TROJAN:MISC:ILLUSION-1-0
TROJAN:MISC:ULTIMATE-RAT21
TROJAN:MISC:CRAZZYNET-SRV-RESP
TROJAN:MISC:MILLENIUM-SERV-RESP
TROJAN:MISC:VAMPIRE-SRV-RESP
TROJAN:MISC:NETTERROR-SRV-RESP
TROJAN:MISC:HELLZ-SRV-RESP
TROJAN:MISC:PITFALL-TELNET-ID
TROJAN:MISC:CONNECTION-RESP
TROJAN:MISC:MOONPIE-FTP-RESP
TROJAN:MISC:PRAYER-SERV-RESP
TROJAN:MISC:ULLYSSE

TROJAN:MS-04-028

TROJAN:MS-04-028:R-ADMIN-START
TROJAN:MS-04-028:TOOL-DOWNLOAD
TROJAN:MS-04-028:BACKDOOR-LOGIN

TROJAN:MYDOOM

TROJAN:MYDOOM:S-IRC-BACKDOOR
TROJAN:MYDOOM:MYDOOM-TROJAN
TROJAN:MYDOOM:AH-HTTP-INFECT

TROJAN:NETBUS

TROJAN:NETBUS:SERVER-RES-12346
TROJAN:NETBUS:PRO-SERVER-RES
TROJAN:NETBUS:SERVER-RES-12345
TROJAN:NETBUS:CLT-GETINFO-12346
TROJAN:NETBUS:CLT-GETINFO-12345

TROJAN:NETDEVIL

TROJAN:NETDEVIL:NETDEVIL1-4
TROJAN:NETDEVIL:NETDEVIL
TROJAN:NETDEVIL:NETDEVIL-STC

TROJAN:NETMTROPOL

TROJAN:NETMTROPOL:CLI-REQ-5301
TROJAN:NETMTROPOL:CLI-REQ-5302

TROJAN:NETSPHERE

TROJAN:NETSPHERE:SVR-RES
TROJAN:NETSPHERE:SVR-RES-HIGH

TROJAN:PHASEZERO

TROJAN:PHASEZERO:SERVER-RES

TROJAN:PHATBOT

TROJAN:PHATBOT:CMD-CONNECT
TROJAN:PHATBOT:FTP-CONNECT

TROJAN:QAZ

TROJAN:QAZ:TCP25-CALLING-HOME
TROJAN:QAZ:TCP139-SCAN
TROJAN:QAZ:CLIENT-LOGIN

TROJAN:REMOTE-EXPLORER

TROJAN:REMOTE-EXPLORER:CONNECT

TROJAN:SATANS-BD

TROJAN:SATANS-BD:SERVER-RES

TROJAN:SUBSEVEN

TROJAN:SUBSEVEN:2.2-SERVER-RES
TROJAN:SUBSEVEN:SCAN
TROJAN:SUBSEVEN:SUBSEVEN
TROJAN:SUBSEVEN:SUBSEVEN-HTTP
TROJAN:SUBSEVEN:2.1.A-SRVR-RES

TROJAN:TELNET

TROJAN:TELNET:USER-HIDESOURCE
TROJAN:TELNET:USER-BACKDOOR
TROJAN:TELNET:USER-LRKR0X
TROJAN:TELNET:USER-FRIDAY
TROJAN:TELNET:USER-REWT
TROJAN:TELNET:USER-R00T
TROJAN:TELNET:USER-SATORI
TROJAN:TELNET:USER-HAX0R
TROJAN:TELNET:USER-HIDEPAK
TROJAN:TELNET:USER-W00W00
TROJAN:TELNET:USER-WH00T
TROJAN:TELNET:USER-D13HH

TROJAN:Y3K-RAT

TROJAN:Y3K-RAT:Y3K16-RAT-BANNER
TROJAN:Y3K-RAT:Y3K14-RAT-TCP

TROJAN:YAT

TROJAN:YAT:YAT-BANNER

UDP

UDP:PORT-ZERO
UDP:ZERO-DATA
UDP:MS-WINDOWS-TCP-IP-CNTR
UDP:XTACACSD-BO

VIRUS

VIRUS:HERE-YOU-HAVE
VIRUS:BITCOIN-MINER-BOTNET

VIRUS:POP3

VIRUS:POP3:SOBER-K
VIRUS:POP3:UUENCODED-DOT-VBS
VIRUS:POP3:EICAR-ATTACHMENT
VIRUS:POP3:NIMDA

VIRUS:SMTP

VIRUS:SMTP:DOUBLE-EXTENSION
VIRUS:SMTP:NIMDA
VIRUS:SMTP:EICAR-ATTACHMENT
VIRUS:SMTP:EXE-IN-ZIP
VIRUS:SMTP:UUENCODED-DOT-VBS
VIRUS:SMTP:EXE-ATTACH-1
VIRUS:SMTP:LOCALHOST-HELO
VIRUS:SMTP:ZONEALARM-EXE

VNC

VNC:SESSION
VNC:ULTRA-CLIENT-OF
VNC:ULTRAVNC-CLIENT-AUTH-OF
VNC:AUTH-BYPASS
VNC:QEMU-KVM-DOS
VNC:CHICKEN-VNC-DOS
VNC:GNOME-VINO-VNC-SERVER-DOS

VNC:AUDIT

VNC:AUDIT:CONNECT-FAIL
VNC:AUDIT:AUTH-FAILED
VNC:AUDIT:AUTH-SCHEME
VNC:AUDIT:UNKNOWN-SERVER-MSG
VNC:AUDIT:AUTH-STATUS
VNC:AUDIT:SERVER-BITPERPIXEL
VNC:AUDIT:CLIENT-BITPERPIXEL
VNC:AUDIT:UNKNOWN-CLIENT-MSG
VNC:AUDIT:ENCODING-TYPE

VNC:ERR

VNC:ERR:CONFLICT-HEXTILE-MASK
VNC:ERR:TOO-MANY-AUTH-FAIL
VNC:ERR:SVR-CUT-TOO-LONG
VNC:ERR:BRUTE-FORCE
VNC:ERR:NO-AUTH-SCHEME
VNC:ERR:SVR-CUT-OVERFLOW
VNC:ERR:CLNT-CUT

VNC:INVALID

VNC:INVALID:NAME-TOO-LONG
VNC:INVALID:SERVER-RESPONSE
VNC:INVALID:SERVER-VERSION
VNC:INVALID:CLIENT-VERSION
VNC:INVALID:CLIENT-REQUEST

VNC:OVERFLOW

VNC:OVERFLOW:AUTH-CHALLENGE
VNC:OVERFLOW:CLIENT-INIT
VNC:OVERFLOW:AUTH-STATUS
VNC:OVERFLOW:AUTH-RESPONSE
VNC:OVERFLOW:NAME
VNC:OVERFLOW:SET-ENCODINGS
VNC:OVERFLOW:REASON
VNC:OVERFLOW:CLIENT-CUT-TEXT
VNC:OVERFLOW:RSN-TOO-LONG
VNC:OVERFLOW:REALVNC-MSG-BO

VOIP

VOIP:ASTERISK-IAX2-DOS
VOIP:IAX-INT-OF
VOIP:APPLE-FACETIME-REQ
VOIP:CISCO-UCM-OF
VOIP:ASTERISK-CS-OVERFLOW
VOIP:SKINNY-DRV-DOS
VOIP:IAX2-DOS

VOIP:H225RAS

VOIP:H225RAS:REG-BAD-ID-CHAR
VOIP:H225RAS:URQ-DOS

VOIP:H225RAS:AUDIT

VOIP:H225RAS:AUDIT:UNKN-MESSAGE

VOIP:H225RAS:DOS

VOIP:H225RAS:DOS:ARQ
VOIP:H225RAS:DOS:LRQ
VOIP:H225RAS:DOS:RRQ

VOIP:H225SGN

VOIP:H225SGN:SETUP-NOTGRANT-IP
VOIP:H225SGN:SETUP-NOGRANT-PORT
VOIP:H225SGN:RELEASE-COMPLETE
VOIP:H225SGN:SETUP
VOIP:H225SGN:PROTO

VOIP:MGCP

VOIP:MGCP:INVALID-HEX-HIGH
VOIP:MGCP:DOUBLE-ENCODING
VOIP:MGCP:INVALID-HEX-LOW
VOIP:MGCP:INV-CHAR-LOW
VOIP:MGCP:OVERLONG-UTF8
VOIP:MGCP:LINE-OVERFLOW
VOIP:MGCP:INV-CHAR-HIGH
VOIP:MGCP:UTF8-ERROR

VOIP:MGCP:AUDIT

VOIP:MGCP:AUDIT:INV-EP-NAME
VOIP:MGCP:AUDIT:INV-CMD-HDR
VOIP:MGCP:AUDIT:UNKNOWN-METHOD
VOIP:MGCP:AUDIT:INV-TRANS-ID
VOIP:MGCP:AUDIT:INV-PARM-RM
VOIP:MGCP:AUDIT:INV-RSP-HDR
VOIP:MGCP:AUDIT:INV-PARM-NAME
VOIP:MGCP:AUDIT:INV-PARM-RD
VOIP:MGCP:AUDIT:INV-CONN-ID
VOIP:MGCP:AUDIT:INV-CALL-ID
VOIP:MGCP:AUDIT:INV-IP-DOMAIN

VOIP:MGCP:SDP

VOIP:MGCP:SDP:HEADER-UNK-ERR
VOIP:MGCP:SDP:SYNTAX-ERROR
VOIP:MGCP:SDP:HEADER-RPT-ERR
VOIP:MGCP:SDP:HEADER-ORD-ERR
VOIP:MGCP:SDP:INV-CI
VOIP:MGCP:SDP:INV-ORIGIN
VOIP:MGCP:SDP:VERSION-OF
VOIP:MGCP:SDP:MAL-HEADER
VOIP:MGCP:SDP:TIME-OF
VOIP:MGCP:SDP:MEDIA-PORT-OF

VOIP:MGMT

VOIP:MGMT:XPRESSA-HTTP-DOS
VOIP:MGMT:VICIDIAL-INFO-DISC

VOIP:RTP

VOIP:RTP:FLOW-START
VOIP:RTP:FLOW-START-VIDEO
VOIP:RTP:RTPFLOOD-DOS
VOIP:RTP:IAXFLOOD-DOS

VOIP:SIP

VOIP:SIP:BRUTE-FORCE
VOIP:SIP:OVERSIZED-UDP-MSG
VOIP:SIP:SHORT-REQUEST
VOIP:SIP:SHORT-RESPONSE
VOIP:SIP:HAMMER
VOIP:SIP:HEADER-UFLOW
VOIP:SIP:DOUBLE-ENCODING
VOIP:SIP:SECURITY-BAD-SCHEMA
VOIP:SIP:MALFORMED-PORT
VOIP:SIP:SECURITY-PAR-UFLOW
VOIP:SIP:SECURITY-PAR-ERR
VOIP:SIP:BRUTE-INV
VOIP:SIP:SQL-CMD-1
VOIP:SIP:EMERGENCY-NUMBER
VOIP:SIP:SQL-INJ
VOIP:SIP:EMERGENCY-PRIORITY
VOIP:SIP:SQL-CMD-2
VOIP:SIP:UNKNOWN-DATA
VOIP:SIP:KEEP-ALIVE-2
VOIP:SIP:BYE-AUTH
VOIP:SIP:ASTERISK-RTP-TYPE
VOIP:SIP:SESSION-REQ
VOIP:SIP:BIN-IN-AUTH-RESP
VOIP:SIP:UNK-SRV-RESP
VOIP:SIP:SRV-RESP-400
VOIP:SIP:SRV-RESP-401
VOIP:SIP:KEEP-ALIVE
VOIP:SIP:RESPR-INV-OPT-OF
VOIP:SIP:KEEP-ALIVE-3
VOIP:SIP:FMT-STR
VOIP:SIP:DIGIUM-ASTERISK-DOS
VOIP:SIP:MULTI-TECH-INVITE-OF
VOIP:SIP:CSCO-INVITE-DOS
VOIP:SIP:ASTERISK-CHANNEL-DOS
VOIP:SIP:ASTERISK-UDPTL-BO
VOIP:SIP:INVITEFLOOD-DOS
VOIP:SIP:TEARDOWN-BYE-DOS
VOIP:SIP:BT-RECON-SIPSCAN
VOIP:SIP:BT-RECON-SVMAP
VOIP:SIP:BT-RECON-SMAP
VOIP:SIP:BT-RECON-ENUMIAX
VOIP:SIP:ASTERISK-RES-DOS
VOIP:SIP:SIPSAK-OPTION-FLOOD
VOIP:SIP:ASTERISK-SDP-MEDIA-DOS

VOIP:SIP:AUDIT

VOIP:SIP:AUDIT:UNK-HEADER
VOIP:SIP:AUDIT:DUPLICATE-HEADER
VOIP:SIP:AUDIT:INV-REP-HEADER
VOIP:SIP:AUDIT:INV-REQ-HEADER
VOIP:SIP:AUDIT:MISSING-VERSION
VOIP:SIP:AUDIT:SYNTAX-ERROR
VOIP:SIP:AUDIT:UNK-METHOD
VOIP:SIP:AUDIT:NO-COLON
VOIP:SIP:AUDIT:CONTENT-LENGTH
VOIP:SIP:AUDIT:INV-CHARACTER
VOIP:SIP:AUDIT:EMPTY-HEADER-VAL
VOIP:SIP:AUDIT:INVALID-RCODE
VOIP:SIP:AUDIT:INV-TERMINATION
VOIP:SIP:AUDIT:INV-CHAR-HIGH
VOIP:SIP:AUDIT:INV-CHAR-LOW
VOIP:SIP:AUDIT:BAD-IPV4
VOIP:SIP:AUDIT:URI-ERROR
VOIP:SIP:AUDIT:INVALID-HEX-LOW
VOIP:SIP:AUDIT:BAD-IPV6
VOIP:SIP:AUDIT:INVALID-HEX-HIGH
VOIP:SIP:AUDIT:UTF8-ERROR
VOIP:SIP:AUDIT:NOT-SIP
VOIP:SIP:AUDIT:INV-CSEQ
VOIP:SIP:AUDIT:INV-FROM
VOIP:SIP:AUDIT:INV-CONTACT
VOIP:SIP:AUDIT:INV-CONT-TYPE
VOIP:SIP:AUDIT:INV-URI
VOIP:SIP:AUDIT:SESSION-HIJACK
VOIP:SIP:AUDIT:TELEPRESENCE
VOIP:SIP:AUDIT:INV-VIA-PROT-ID
VOIP:SIP:AUDIT:INV-INVITE-SRC
VOIP:SIP:AUDIT:INV-PARA-VIA
VOIP:SIP:AUDIT:DUPLICATE-INVITE
VOIP:SIP:AUDIT:INV-CALL-ID

VOIP:SIP:LIMITS

VOIP:SIP:LIMITS:CALL-INFO-OF
VOIP:SIP:LIMITS:CONTACT-OF
VOIP:SIP:LIMITS:CONTENT-LEN-OF
VOIP:SIP:LIMITS:EXPIRES-OF
VOIP:SIP:LIMITS:CSEQ-OF
VOIP:SIP:LIMITS:FROM-OF
VOIP:SIP:LIMITS:CONTENT-TYPE-OF
VOIP:SIP:LIMITS:IN-REPLY-TO-OF
VOIP:SIP:LIMITS:SIP-NEG-CNT-LEN
VOIP:SIP:LIMITS:MAX-FWRDS-OF
VOIP:SIP:LIMITS:MIN-EXPIRES-OF
VOIP:SIP:LIMITS:REJ-CONTACT-OF
VOIP:SIP:LIMITS:CALL-ID-OF
VOIP:SIP:LIMITS:ACC-OF
VOIP:SIP:LIMITS:ACC-CONTACT-OF
VOIP:SIP:LIMITS:ACC-ENC-OF
VOIP:SIP:LIMITS:ORGANIZATION-OF
VOIP:SIP:LIMITS:PROX-REQ-OF
VOIP:SIP:LIMITS:AUTH-INFO-OF
VOIP:SIP:LIMITS:REC-ROUTE-OF
VOIP:SIP:LIMITS:REQ-DISPO-OF
VOIP:SIP:LIMITS:RETRY-AFTER-OF
VOIP:SIP:LIMITS:PRIORITY-OF
VOIP:SIP:LIMITS:PROX-AUTH-OF
VOIP:SIP:LIMITS:AUTHORIZ-OF
VOIP:SIP:LIMITS:ALLOW-OF
VOIP:SIP:LIMITS:CONT-ENC-OF
VOIP:SIP:LIMITS:PROX-AUTHRIZ-OF
VOIP:SIP:LIMITS:ROUTE-OF
VOIP:SIP:LIMITS:ACC-LAN-OF

VOIP:SIP:OVERFLOW

VOIP:SIP:OVERFLOW:SECURITY-PAR
VOIP:SIP:OVERFLOW:LINE-OF
VOIP:SIP:OVERFLOW:MAX-FORWARD
VOIP:SIP:OVERFLOW:HEADER-OF
VOIP:SIP:OVERFLOW:CHUNK-OF
VOIP:SIP:OVERFLOW:LINE-OVERFLOW
VOIP:SIP:OVERFLOW:OVERLONG-UTF8
VOIP:SIP:OVERFLOW:PORT-OF
VOIP:SIP:OVERFLOW:USERNAME
VOIP:SIP:OVERFLOW:METHOD
VOIP:SIP:OVERFLOW:FROM-OF
VOIP:SIP:OVERFLOW:T-38-SDP-OF
VOIP:SIP:OVERFLOW:HDR-EXP-OF
VOIP:SIP:OVERFLOW:QPOP-OF
VOIP:SIP:OVERFLOW:VIA-HOST-OF
VOIP:SIP:OVERFLOW:HDR-URI-OF
VOIP:SIP:OVERFLOW:SIPXTAPI-OF

VOIP:SIP:SDP

VOIP:SIP:SDP:HEADER-ORD-ERR
VOIP:SIP:SDP:SYNTAX-ERROR
VOIP:SIP:SDP:HEADER-RPT-ERR
VOIP:SIP:SDP:HEADER-UNK-ERR
VOIP:SIP:SDP:TIME-OF
VOIP:SIP:SDP:MAL-HEADER-CTS
VOIP:SIP:SDP:MEDIA-PORT-OF
VOIP:SIP:SDP:VERSION-OF
VOIP:SIP:SDP:INV-CI
VOIP:SIP:SDP:HDR-BOF
VOIP:SIP:SDP:MAL-HEADER-SRV

VOIP:SKYPE

VOIP:SKYPE:SKYPE-ENCRYPTED
VOIP:SKYPE:INSTALL
VOIP:SKYPE:VERSION-CHECK
VOIP:SKYPE:LOGIN
VOIP:SKYPE:PROBE-1
VOIP:SKYPE:CONNECTION

VOIP:SMPP

VOIP:SMPP:NOKIA-SMS-MMS-DOS

WHOIS

WHOIS:REQUEST-TOO-LONG
WHOIS:UNEXPECTED-REPLY
WHOIS:INVALID_EOL
WHOIS:TUNNEL

WORM

WORM:COMMWARRIORB
WORM:BLACKHOLE-ACTIVITY
WORM:LOVEGATE-INFECTED
WORM:WORM-BROPIA-F
WORM:CHOD.B
WORM:CHUNKED-WORM
WORM:DISTTRACK-USER-AGENT
WORM:DISTTRACK-CNC
WORM:DISTTRACK-PROPAGATION
WORM:AKAK-TRAFFIC
WORM:STATS-PHP-IFRAME
WORM:MARE-D-SCAN
WORM:THE-MOON-LINKSYS
WORM:MINIFLAME-CNC

WORM:AGOBOT

WORM:AGOBOT:PY-HTTP-PROP
WORM:AGOBOT:SASSER-FTP-OF

WORM:BAGLE

WORM:BAGLE:Q-HTTP
WORM:BAGLE:HTTP-BACKDOOR
WORM:BAGLE:AF-HTTP

WORM:BERBEW

WORM:BERBEW:KEYLOGGER-UPLOAD

WORM:BLASTER

WORM:BLASTER:BACKDOOR-CMD

WORM:CODERED

WORM:CODERED:INFECTION-ATTEMPT

WORM:CODERED-2

WORM:CODERED-2:INFECT-ATTEMPT

WORM:CONFICKER

WORM:CONFICKER:C-ACTIVITY
WORM:CONFICKER:C-ACTIVITY-2

WORM:DABBER

WORM:DABBER:TFTP-TRANSFER
WORM:DABBER:SASSER-PROBE
WORM:DABBER:B-BACKDOOR-CMD

WORM:EMAIL

WORM:EMAIL:SOBIG-DL-REQUEST

WORM:FIZZER

WORM:FIZZER:IRC-CHAN-1
WORM:FIZZER:IRC-CHAN-2

WORM:LOVGATE

WORM:LOVGATE:P-NET-SHARE-SPREAD
WORM:LOVGATE:BACKDOOR-LOGIN

WORM:MASLAN

WORM:MASLAN:IRC-BACKDOOR-CON

WORM:MIMAIL

WORM:MIMAIL:MIMAIL.A

WORM:MOFEI

WORM:MOFEI:MOFEI-B-PROPAGATION
WORM:MOFEI:MOFEI-BACKDOOR2
WORM:MOFEI:MOFEI-BACKDOOR3

WORM:MYTOB

WORM:MYTOB:ED-IRC

WORM:NACHI

WORM:NACHI:D-WEBDAV-ATK
WORM:NACHI:B-C-D-INFECT-ATTEMPT

WORM:NETSKY

WORM:NETSKY:V-SMTP-PROP

WORM:NIMDA

WORM:NIMDA:NIMDA-RICHED20
WORM:NIMDA:EMAIL-PROP
WORM:NIMDA:BIN-255-CMD
WORM:NIMDA:NIMDA-NWS
WORM:NIMDA:NIMDA-EML
WORM:NIMDA:SCRIPTS-ROOT
WORM:NIMDA:SCRIPTS-C11C-CMD
WORM:NIMDA:SCRIPTS-CMD
WORM:NIMDA:MSADC-ROOT

WORM:PHPINCLUDE

WORM:PHPINCLUDE:EXPLOIT
WORM:PHPINCLUDE:SEARCH-REQ

WORM:SANTY

WORM:SANTY:INFECT-ATTEMPT
WORM:SANTY:GOOGLE-SEARCH

WORM:SASSER

WORM:SASSER:FTP-SRV-OVERFLOW
WORM:SASSER:A-D-F-FTP-DL-5554
WORM:SASSER:A-D-F-SHELL-CMD

WORM:SDBOT

WORM:SDBOT:DX-IRC-BEACON
WORM:SDBOT:OH-BACKDOOR-COMMAND

WORM:SLAMMER

WORM:SLAMMER:INFECT-ATTEMPT

WORM:SLAPPER

WORM:SLAPPER:CINIK-SRC
WORM:SLAPPER:WORM-INFECT
WORM:SLAPPER:C-INFECT
WORM:SLAPPER:B-INFECT
WORM:SLAPPER:AION-INFECT
WORM:SLAPPER:C2-INFEC

WORM:SMB

WORM:SMB:DELODER-2
WORM:SMB:DELODER
WORM:SMB:BUGBEAR-B
WORM:SMB:W32-SLACKOR

WORM:SQL-SNAKE

WORM:SQL-SNAKE:MSSQL-REG-2
WORM:SQL-SNAKE:MSSQL-REG-3
WORM:SQL-SNAKE:MSSQL-REG-1

WORM:WITTY

WORM:WITTY:INFECT-ATTEMPT

WORM:ZAFI

WORM:ZAFI:D-BACKDOOR-UPL

X11

X11:X11-XC-QUERY-SECURITY
X11:XFS-SWAP-CHAR
X11:XFS-QUERYX

APP:ENCRYPTED-TRAFFIC-2

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is moderately strict, and is a compromise between false-positives and false-negatives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-3

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the most strict, and should create the fewest false positives.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:ENCRYPTED-TRAFFIC-1

Description

This anomaly triggers when it detects traffic that appears to be encrypted and that does not match any known protocol. This anomaly can be used to detect protocols that try to avoid detection, such as skype, bittorrent, or botnets. This version of the anomaly is the least strict, and should catch the most traffic, but might trigger on non-encrypted traffic.

Severity

INFO

Group

APP

Supported By

idp-4.1.110110609+

APP:NAV-ENT-WEB-OF

Description

This signature detects attempts to exploit a known vulnerability in Norton Antivirus Enterprise (NAV). A successful attack can lead to a stack overflow causing a denial of service or arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

An attacker could exploit the vulnerability to execute arbitrary code with System level privileges.

References

APP:FREEPBX-CALLMENUM

Description

This signature detects attempts to exploit a known vulnerability against FreePBX. A successful attack can lead to arbitrary code execution. Version 2.10.0, 2.9.0 are affected by this vulnerability. Other versions might also be affected.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

myFAQ is prone to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. These vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in modification of query logic or other attacks. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

Affected Products

References

APP:CONEXANT-LOGIN

Description

This signature detects a default blank login to a DSL router based on the Conexant chipset. Attackers can supply a blank password on a secret port to modify the router settings.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The authentication mechanism used by the Conexant AccessRunner DSL Console can be bypassed. This could allow a remote user to access the device's configuration settings. ** The discoverer of this issue has reported that it may not be present in some devices. There is currently no known reason for why some devices are vulnerable while others are not. This record will be updated if and when further details become available.

Affected Products

References

APP:SVN-DATE-SERVE

Description

This signature detects attempts to exploit a known vulnerability in the Subversion Svnserve. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

References

APP:WINCOM-AUTH-BO

Description

This signature detects attempts to exploit a known vulnerability against WinComLPD. A successful attack allows attackers to execute arbitrary code with the privileges of the user running the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:GIOP-COMM

Description

This signature detects properly formatted GIOP communication. This signature triggers when your network is carrying Object Request Broker traffic.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:JONDO-PROXY

Description

This signature detects the runtime behavior of Jondo Privacy Generator. Jondo is a proxy application that enables users to re-route communication through an encrypted pipe. This is usually used to bypass corporate network usage policies.

Severity

INFO

Group

APP

Supported By

idp-4.1+, isg-3.5+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:YOUSENDIT

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:NTOP-WEB-FS1

Description

This signature detects attempts to exploit a known vulnerability against Ntop, an application for displaying network usage (similar to the common UNIX command "top"). When the Web interface is enabled (tcp/3000), attackers can send a maliciously crafted string to crash the ntop daemon and execute arbitrary commands.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

ntop is a tool designed to give an overview of network performance and usage, similar to the Unix top command. ntop was designed for Linux, BSD and Unix based systems, although it has also been ported to Windows. A vulnerability has been reported in some versions of ntop. User supplied data is used in an unsafe manner in printf and syslog calls, leading to a format string vulnerability. Exploitation of this vulnerability may result in the execution of arbitrary code. If ntop is executed with the -w flag, it may be possible to remotely exploit this vulnerability through a malicious HTTP request. It was also reported that this condition was produced using Netscape with the following web request: http://target:port/`ls` This occurred because Netscape was URL encoding the request, which caused the request to be interpreted as a format string by NTop. For example, `ls` is converted to %60ls%60. Other versions of ntop may share this vulnerability. This has not been confirmed.

Affected Products

References

APP:RH-ICOMMERCE-ANYFILE

Description

This signature detects attempts to exploit a directory traversal vulnerability in Red Hat Interchange Commerce Servers. A successful directory traversal attack, can allow attackers to read any file on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A vulnerability has been reported for Interchange 4.8.5 and earlier. Reportedly, Interchange may disclose contents of files to attackers. The vulnerability occurs due to the placement of the 'doc' folder. Reportedly, the folder will be installed as follows: <INTERCHANGE_ROOT>/doc. This folder, by default, contains Interchange man pages. This vulnerability is only exploitable when the Interchange service runs in INET (Internet service) mode. An attacker may exploit this vulnerability to the contents of restricted files accessible to the Interchange process. It has been reported that this issue may be exploited through a '../' directory traversal sequence in a HTTP request to the vulnerable server.

Affected Products

References

APP:SUPERSCOUT-USERDB

Description

This signature detects attempts to exploit a known vulnerability in the Webfilter for SuperScout Web Reports Server running on Microsoft Windows 2000 and NT. Attackers can use a simple GET request to obtain the user database (a txt file that contains user names and encrypted passwords) from the server.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

SurfControl SuperScout WebFilter is web filtering software for Microsoft Windows operating systems. SurfControl SuperScout WebFilter includes a remotely accessible reporting service. It has been reported that SuperScout WebFilter insecurely stores some types of information. The reports server included as part of the SuperScout WebFilter package stores sensitive information in a publicly accessible, unrestricted directory. A remote user could gain access to user credentials.

Affected Products

References

APP:EMC-NETWORKER-BYPASS

Description

This signature detects attempts to exploit a known security bypass vulnerability against EMC Legato Networker. A successful attack can lead to arbitrary code execution.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

EMC NetWorker is prone to a vulnerability that allows attackers to spoof source addresses. An attacker can exploit this issue to spoof a source address, allowing the attacker to perform denial-of-service attacks or eavesdrop on process communications.

Affected Products

References

APP:SCOHELP-OF1

Description

This signature detects attempts to exploit a known vulnerability against SCO Unixware's Netscape Fasttrack scohelp httpd service. An attacker can supply an overly long URL to potentially gain command-line access as the user running the service, to the victim host. A successful attack can cause a buffer overflow condition. This is known to affect scohelp 2.01a running on SCO Unixware 7.1.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

SCO Unixware 7 default installation includes scohelp, an http server that listens on port 457/tcp and allows access to manual pages and other documentation files. The search CGI script provided for that purpose has a vulnerability that could allow any remote attacker to execute arbitrary code on the vulnerable machine with privileges of user "nobody". This poses a threat that could result in the remote compromise of the vulnerable host and provide a staging point from where an attacker could escalate privileges.

Affected Products

References

APP:IPSO-FILE-VIEW

Description

This signature detects attempts to exploit a known vulnerability in "Voyager", a Web GUI included with Nokia IP-boxes. IPSO 3.6-FCS6 and other versions are vulnerable. Attackers can use Voyager to instruct a CGI script to view the contents of arbitrary files on the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

It has been reported that Nokia IPSO does not properly handle some types of requests through Voyager. Because of this, an attacker with access to the interface may be able to view potentially sensitive information.

Affected Products

References

APP:HP-DATA-PROTECTOR-MMD-BOF

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Manager MMD Service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability because of an access violation error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager A.06.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:CUPS-GIF-BO

Description

This signature detects attempts to exploit a known vulnerability against multiple vendor CUPS GIF Decoders. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

CUPS is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied GIF image data before copying it to an insufficiently sized buffer. Successful exploits allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. CUPS 1.3.6 is vulnerable; other versions may also be affected.

Affected Products

References

APP:SECURECRT-CONF

Description

This signature detects TELNET URLs that specify a SecureCRT configuration folder option. SecureCRT prior to 4.1.9 contain a vulnerability that allows configurations files to contain login script information. An attacker can entice a target to open a TELNET URL that specifies an external configuration file containing an arbitrary script.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A remote command execution vulnerability affects Van Dyke's SecureCRT. This issue is due to a design error that allows a remote attacker to execute arbitrary script on the affected computer with the privileges of the affected application. An attacker may leverage this issue to execute arbitrary code with the privileges of the user that activated the affected application; this may facilitate privilege escalation or unauthorized access.

Affected Products

References

APP:LIBGTOP-FMT-STR

Description

This signature detects attempts to exploit a known vulnerability in libgtop. Attackers can send a malformed request that can allow them to take control of the server with libgtop process privileges.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The GNOME libgtop_daemon is used to monitor processes running on a remote Linux system running GNOME. Under some conditions, when a remote connection fails, user supplied input is used as a format string within a log message. A malicious user may construct a string including format modifiers, causing stack information to be written to the log file, and possibly leading to remote execution of arbitrary code. Older versions of libgtop_daemon may share this vulnerability.

Affected Products

References

APP:WINMAIL-PATH-DIS

Description

This signature detects attempts to access a vulnerable Winmail module. A successful exploit can allow attackers to obtain information about the server's internal structure.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:CPANEL-RESETPASS

Description

This signature detects attempts to remotely execute a command on a cPanel system. There is a feature which allows users to reset their passwords by email; when this feature is enabled, it allows users to execute commands as root.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A potential remote command execution vulnerability has been discovered in the cPanel Application. This issue occurs due to insufficient sanitization of externally supplied data to the script that handles resetting user passwords. An attacker may exploit this problem by crafting a malicious URI request for the affected script; the attacker may then supply shell metacharacters and arbitrary commands as a value for the affected variable.

Affected Products

References

APP:BRG-MAIL-US-PASS

Description

This signature detects attempts to exploit a known vulnerability against Brightmail AntiSpam. Versions earlier than 6.0.2 are vulnerable. Attackers can exploit a hard-coded database administrator password vulnerability to bypass security restrictions and gain administrative access. This could allow attackers to modify the device behavior.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Symantec Brightmail AntiSpam is susceptible to a remote information disclosure vulnerability. This issue is due to a failure of the application to properly ensure that remote database access is properly disabled. In cases where the affected package was upgraded, rather than freshly installed, remote database access was not properly disabled. Remote access to the database may be simplified for attackers, as the database utilizes a static password. This vulnerability allows remote attackers to gain access to potentially sensitive database contents.

Affected Products

References

APP:POSTFIX-GLD-FS

Description

This signature detects attempts to exploit a known vulnerability in the Postfix Greylisting daemon. A successful exploit with a malicious format string, can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

It is reported that GLD contains a format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function. Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers. GLD version 1.4 is reportedly affected, but prior versions may also be affected.

Affected Products

References

APP:COLDFUSIONMX-ACC

Description

This signature detects attempts to access the fileprobe.cfm. With default settings, Macromedia ColdFusion MX will return an error message containing the full path of the ColdFusion software. Versions 6.x are vulnerable.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A vulnerability has been reported for Macromedia ColdFusion MX that may reveal the physical path information to attackers. When certain malformed URL requests are received by the server, an error message is returned containing the full path of the ColdFusion installation.

Affected Products

References

APP:NAV-ENT-WEB-OF-2

Description

This signature detects attempts to exploit a known vulnerability in Norton Antivirus Enterprise (NAV). A successful attack can cause a stack overflow causing a denial-of-service condition or arbitrary code execution.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A buffer overflow vulnerability exists in the Web-based administrative interface of the Symantec Antivirus Scan Engine. This issue is due to improper bound checking of user-supplied data prior to copying it into an insufficiently sized memory buffer. This vulnerability allows attackers to execute arbitrary machine code in the context of the affected application. This allows remote attackers to gain privileged remote access to computers running the affected application.

Affected Products

References

APP:MERCURY-BOF

Description

This signature detects attempts to exploit a known vulnerability in the Mercury Mail Transport System product. The vulnerability is created by the lack of proper enforcement of maximum allowable length of user supplied data. A malicious unauthenticated attacker can exploit this vulnerability, which can result in a stack buffer overflow leading to arbitrary code execution on the target host.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Mercury Mail is prone to a remote buffer-overflow vulnerability in its mailbox name service. This issue occurs because the application fails to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM privileges in the context of the affected server process. Mercury Mail 4.01b is affected; other versions may also be affected.

Affected Products

References

APP:VMS-8.3.5-CMD-EXE

Description

This signature detects an attempt to redirect the flow of the VisNetic MailServer administration interface. A successful attack can lead to arbitrary command execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:MOZY-ACTY

Description

This signature detects the activity of the Mozy Backup Client. Mozy is an on-line file backup service provided by Berkeley Data Systems.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:GOOG-PICASA

Description

This signature detects the activity of the Google Picasa Client. Picasa is a photo repository, editing, and uploading client by Google Inc.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:PEER2MAIL

Description

This signature detects the Peer2Mail application. Peer2Mail allows files to be stored on a mail server as e-mail attachments for later retrieval from another computer. This can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:EMC-ALPHA-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC AlphaStor Agent. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

EMC AlphaStor Server Agent is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Successful exploits may allow attackers to execute arbitrary code with SYSTEM-level privileges; failed attempts will likely cause denial-of-service conditions. These issues affect AlphaStor 3.1 SP1 for Windows. Previous versions, and versions for additional platforms, may also be affected.

Affected Products

References

APP:ALTN-WORLDCLIENT-MEM

Description

This signature detects attempts to exploit a known vulnerability against the Alt-N MDaemon WorldClient Service. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:SENTINEL-LM-OF

Description

This signature detects attempts to exploit a known vulnerability in the Sentinel License Manage. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

A remote buffer overflow vulnerability affects SafeNet Sentinel License Manager. This issue is due to a failure of the application to securely copy network-derived data into finite process buffers. An attacker may leverage this issue to execute arbitrary code with SYSTEM privileges.

Affected Products

References

APP:HP-LOADRUNNER-RCE

Description

This signature detects attempts to exploit a known vulnerability against HP LoadRunner. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.

Affected Products

References

APP:WINPRICE

Description

This signature detects activity of the WinPrice client, an application made by Quatrain (http://www.katren.ru) for purchasing prescription drugs over the Internet. This activity may be illegal in your area.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:BORLAND-STARTEAM

Description

This signature detects attempts to exploit a known vulnerability in the Borland CaliberRM 2006. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Borland StarTeam Multicast Service is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will cause a denial-of-service condition. This issue affects Borland StarTeam Multicast Service 6.4 included in Borland CaliberRM 2006, 2007, and 2008. Other Borland products may also be affected.

Affected Products

References

APP:NETSUPPORT-MANAGER-BO

Description

This signature detects attempts to exploit a known vulnerability in the NetSupport Manager client daemon process. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

NetSupport Manager is prone to a buffer-overflow vulnerability because it fails to properly validate user-supplied input. Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts will likely result in denial-of-service conditions. The issue affects the following: NetSupport Manager 11.00 (for Linux) NetSupport Manager 9.50 (for Solaris) NetSupport Manager 11.00 (for Mac OS X) Prior versions may also be affected.

Affected Products

References

APP:SUNPROXY

Description

This signature detects attempts to exploit a known vulnerability against Sun Java Web Proxy Server. Versions Sun Java Web Proxy Server prior to 4.0.5 are vulnerable. A successful attack can allow attackers to inject and execute arbitrary code with System/root privileges.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Sun Java System Web Proxy Server is prone to multiple buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit these issues to execute arbitrary code with superuser privileges, leading to the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. These issues affect Web Proxy Server 4.0.3; prior versions may also be affected.

Affected Products

References

APP:SVN-DATE-OF

Description

This signature detects attempts to exploit a known vulnerability against SVN SubVersion server. Versions 1.0.0 and 0.37 are vulnerable. A successful attack allows the attacker to execute arbitrary code within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Subversion is prone to a buffer-overflow vulnerability that resides in one of its data-parsing functions. Specifically, Subversion calls an 'sscanf()' function when converting data strings to different formats. As a result, the software copies user-supplied data into an unspecified buffer without proper boundary checks. Subversion 1.0.2 and prior versions are prone to this issue.

Affected Products

References

APP:HP-LEFTHAND-HYDRA-PING-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP LeftHand Virtual SAN Appliance. A successful attack can lead to a heap overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1513.

Affected Products

References

APP:CHKPOINT-FW-INFO-DISC

Description

This signature detects attempts to exploit an information disclosure vulnerability in Checkpoint Firewall WebUI. Due to insufficient sanitization of user input, attackers can gain access to arbitrary files on the targeted system.

Severity

MEDIUM

Group

APP

Supported By

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:FEDORA-DIR-SER-INFO-LEAK

Description

This signature detects an information disclosure attack against the Fedora directory service. Fedora Directory Server 1.0.2 DSGW is vulnerable to an information leakage that can allow an attacker to retrieve multiples files on the system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:RETRO-CL-BO

Description

This signature detects attempts to exploit a known vulnerability in the EMC Retrospect Client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Dantz Retrospect Backup Client is prone to a remote buffer-overflow vulnerability. This issue is due to the application's failure to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. This issue allows remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely crash the application, denying further service to legitimate users.

Affected Products

References

APP:HP-STORAGEWORKS-BOF

Description

This signature detects attempts to exploit a known vulnerability against HP StorageWorks. A successful attack can allow attackers to execute remote code with system privileges.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP StorageWorks Storage Mirroring Software (SWSM) is prone to a remote code-execution vulnerability. Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of the affected application. The issue affects SWSM 4.5 SP1.

Affected Products

References

APP:EMC-DATA-PROTECTION-DOS

Description

This signature detects attempts to exploit a known vulnerability against EMC Data Protection Advisor. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:ISCSI-TARGET-FMT-STR

Description

This signature detects attempts to exploit a known format string vulnerability in multiple implementations iSCSI target. iSCSI, an abbreviation of Internet Small Computer System Interface, is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. It can be leveraged by remote unauthenticated attackers to inject and execute arbitrary code on a vulnerable system.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

iSCSI Enterprise Target and tgt are prone to multiple format-string vulnerabilities because they fail to properly sanitize user-supplied input before passing it as the format specifier to a formatted-printing function. An attacker may exploit these issues to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. Other attacks may also be possible, including data loss or corruption.

Affected Products

References

APP:SITEMINDER-AUTH-REDIR

Description

This signature detects attempts to exploit a known vulnerability in Netegrity's Siteminder application. Attackers can send a maliciously formatted hyperlink designed to trick users into believing they are logging into their Siteminder server. Instead, the hyperlink redirects the user's authentication information to a server under the attacker's control, enabling the attacker to obtain the user's login information.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:CLAMAV-UPX-OF-SMTP

Description

This signature detects attempts to exploit a known vulnerability agains Clam Anti-Virus. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

ClamAV is prone to a heap buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. This issue occurs when the application attempts to handle compressed UPX files. Exploiting this issue could allow attacker-supplied machine code to execute in the context of the affected application. The issue would occur when the malformed file is scanned manually or automatically in deployments such as email gateways. ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected.

Affected Products

References

APP:CLAMAV-UPX-OF-HTTP

Description

This signature detects attempts to exploit a known vulnerability in ClamAV. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

ClamAV is prone to a remote buffer-overflow vulnerability. This condition occurs when the program processes malformed UPX-compressed executables. Successful exploitation may result in the execution of arbitrary code in the context of the application.

Affected Products

References

APP:EMC-DOS

Description

This signature detects attempts to exploit a known vulnerability against the EMC Retrospect Backup agent. This vulnerability is a result of improper handling of specially crafted packets. An unauthenticated remote attacker can exploit this vulnerability creating a denial-of-service condition; thereby causing the application to terminate and prevent backups from occurring on that system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Dantz Retrospect Backup Client is prone to a remote denial-of-service vulnerability. An unauthenticated, remote attacker can cause the client to fail. This issue has been addressed in Retrospect Backup Client 6.5.138 and 7.0.109; earlier versions are vulnerable. The Apple Retrospect Backup Client is reportedly not affected.

Affected Products

References

APP:MS-SNBASE

Description

A denial of service vulnerability exists in the snabase.exe component of Microsoft's Host Integration Server, which is an add-on component of Microsoft's BizTalk Enterprise Service Business Suite. Specifically, this vulnerability is due to an infinite loop when processing certain malicious packets. A remote unauthenticated attacker can exploit this vulnerability to effect a denial of service condition on the target server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:FREEPBX-ARI-DOS

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Asterisk Recording Interface (ARI) webui. A malformed request can result in a denial of service of the Web interface.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The Asterisk Recording Interface is prone to the following issues: 1. Multiple security bypass vulnerabilities. 2. A cross-site request-forgery vulnerability. 3. A cross-site scripting vulnerability. Attackers can exploit these issues to steal cookie-based authentication credentials, gain unauthorized access to the application, bypass certain security restrictions, disclose sensitive information, or cause denial-of-service conditions.

Affected Products

References

APP:HP-PROCURVE-BYPASS

Description

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager SNAC. A successful attack can lead to authentication bypass.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Affected Products

References

APP:HP-PROCRVE-SNAC-FILE-UPLD

Description

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Affected Products

References

APP:EIQ-LM-OF

Description

This signature detects attempts to exploit a known vulnerability in eIQnetworks License Manager. Versions prior to 2.5.0 are vulnerable. A successful attack can lead to a buffer overflow and arbitrary remote code execution. Affected Products: eIQnetworks Enterprise Security Analyzer; Astaro Report Manager (OEM); Fortinet FortiReporter (OEM); iPolicy Security Reporter (OEM); SanMina Viking Multi-Log Manager (OEM); Secure Computing G2 Security Reporter (OEM); Top Layer Network Security Analyzer (OEM).

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

eIQnetworks Enterprise Security Analyzer License Manager is prone to a remote buffer-overflow vulnerability. This issue can facilitate a remote compromise due to arbitrary code execution. Enterprise Security Analyzer versions prior to 2.5.0 are vulnerable.

Affected Products

References

APP:HP-DATA-PRTCTR-OP234-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1634.

Affected Products

References

APP:SQUID-HTCP-DOS

Description

A denial of service vulnerability exists in Squid Proxy. The vulnerability is due to a NULL pointer dereference when processing specially crafted Hypertext Caching Protocol (HTCP) packets. Remote attackers can exploit this issue by sending a malicious HTCP request to the target server. Successful exploitation could terminate the affected server process abnormally and result in a denial of service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Squid Web Proxy Cache is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to crash the affected application, denying service to legitimate users.

Affected Products

References

APP:LANDESK-QIP-HEAL

Description

There exists a memory corruption vulnerability in LANDesk QIP service. The vulnerability is due to insufficient validation when processing specially crafted In case of a successful exploitation, the attacker can inject and execute arbitrary code with the privileges of the affected service, normally In the case of an unsuccessful code execution attack, the service will be terminated due to memory corruption, causing Denial of Service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

LANDesk Intel QIP Service is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with SYSTEM-level privileges. This will result in a complete compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects the following: LANDesk Management Suite 8.8 and earlier LANDesk Security Suite 8.8 and earlier LANDesk Server Manager 8.8 and earlier

Affected Products

References

APP:HP-MEDIA-SIGN-IN-NAME-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations SignInName Parameter. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Media Operations is prone to a remote denial-of-service vulnerability that occurs because of a NULL-pointer dereference error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Media Operations 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:HP-DATA-PRTCTR-OP235-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Storage Data Protector 6.20, 6.21, 7.00, and 7.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1633.

Affected Products

References

APP:WEBSENSE-FAV-BYPASS

Description

This signature detects attempts to exploit a known security-bypass vulnerability against multiple Websense products. A successful exploit may allow attackers unauthorized access to a victim's system where they could download, view, or manipulate files.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Multiple Websense products are prone to an authentication-bypass vulnerability. Remote attackers can exploit this issue to bypass the authentication mechanism and gain unauthorized access. The following Websense products are affected: Websense Web Security Gateway Anywhere 7.6 Websense Web Security Gateway 7.6 Websense Web Security 7.6 Websense Web Filter 7.6

Affected Products

References

APP:ZEND-SERVER-JAVA-RCE

Description

This signature detects attempts to exploit a known vulnerability against Zend Server Java Bridge. A successful attack can lead to arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Zend Server is prone to a remote code-execution vulnerability in the Zend Java Bridge component. Successful exploits can allow the attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

References

APP:APPLE-MACOSX-ODP-RCE

Description

This signature detects attempts to exploit a known vulnerability against Apple Mac OS X. A successful attack can lead to arbitrary code execution. Failed exploit attempts could trigger a denial of service condition on the targeted system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Directory Service in Apple Mac OS X through 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted message.

Affected Products

References

APP:AFP-LEN-OF

Description

This signature detects attempts to exploit a known vulnerability in Apple Filing Protocol. Attackers can send a maliciously crafted packet that contains an invalid PathName length to overflow a string buffer and execute arbitrary code. Note: Apple Inc. has fixed this vulnerability in APPLE-SA-2004-05-03 Security Update 2004-05-03

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

It has been reported that AppleFileServer is prone to a remote buffer overflow vulnerability that may allow a remote attacker to execute arbitrary code in order to gain unauthorized access. The issue presents itself when the application receives a 'LoginExt' packet containing a malformed 'PathName' argument. Apple Mac OS X 10.3.3 and prior are reported to be prone to this issue. This issue was previously disclosed in a multiple BID 10268 (Apple OS X Multiple Unspecified Large Input Vulnerabilities), however, it is being assigned a new BID as a result of new information available.

Affected Products

References

APP:HP-LOADRUNNER-SSL

Description

This signature detects attempts to exploit a known vulnerability against HP LoadRunner. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1735.

Affected Products

References

APP:HP-PROCURVE-FILE-UPLD-SSL

Description

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

UpdateCertificatesServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the fileName argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Affected Products

References

APP:AGENTX-RECEIVE-INT-OF

Description

This signature detects attempts to exploit a known buffer overflow vulnerability in multiple products that use the AgentX++ software. It is due to an integer overflow error in AgentX::receive_agentx function that can lead to a heap buffer overflow. A remote unauthenticated attacker can exploit this by sending maximum payload length value in a packet to the target server. A successful attack allows for arbitrary code injection and execution with the privileges of the server process. Code injection that does not result in execution can terminate the application due to memory corruption and can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

AgentX++ is prone to a remote code-execution vulnerability. Exploiting this issue can let attackers execute arbitrary code within the context of the user running the AgentX master process; in some cases, the superuser may be the owner of the process. Failed attempts may cause the application to crash, denying service to legitimate users. AgentX++ 1.4.16 is vulnerable; other versions may also be affected. In addition, these issues affect versions prior to Helix Server and Helix Mobile Server 14.0. NOTE: This issue was previously covered in BID 39490 (RealNetworks Helix and Helix Mobile Server Multiple Remote Code Execution Vulnerabilities) but has been given its own record to better document it.

Affected Products

References

APP:FLASH-RTMP-RESP

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Adobe Flash Player is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following versions are affected: Adobe Flash Player 11.2.202.233 and prior versions for Windows, Mac OS and Linux operating systems Adobe Flash Player 11.1.115.7 and prior versions for Android 4.x Adobe Flash Player 11.1.111.8 and prior versions for Android 3.x and 2.x

Affected Products

References

APP:EMBARCADERO-CONNECT-OF

Description

This signature detects attempts to exploit a known vulnerability against Embarcadero InterBase. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Embarcadero InterBase XE is prone to a stack-based buffer-overflow vulnerability. Successful exploits will allow attackers to execute arbitrary code with SYSTEM privileges. Failed exploit attempts will result in a denial-of-service condition. A successful attack will completely compromise affected computers.

Affected Products

References

APP:HP-MGMT-DBMAN-OF

Description

This signature detects attempts to exploit a known vulnerability in the HP Intelligent Management Center dbman component. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Intelligent Management Center is prone to multiple remote code-execution vulnerabilities. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

References

APP:LANDESK-OF

Description

This signature detects attempts to exploit a known vulnerability in LANDesk Management Suite. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

LANDesk Management Suite is prone to a remote stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue would result in the complete compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects LANDesk Management Suite 8.7; prior versions may also be affected.

Affected Products

References

APP:HP-DATA-PROTECTOR-OP-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:ADOBE-FLASH-RTMP-RCE

Description

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.

Affected Products

References

APP:EMC-ALPHASTOR-LIB-BOF

Description

This signature detects attempts to exploit a known vulnerability against EMC AlphaStor. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Buffer overflow in the Library Control Program (LCP) in EMC AlphaStor 4.0 before build 910 allows remote attackers to execute arbitrary code via crafted commands.

Affected Products

References

APP:BAOFENG-STORM-PLAYLIFL-BO

Description

This signature detects attempts to exploit a known vulnerability in the BaoFeng Storm multimedia player. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

BaoFeng Storm is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Storm 3.09.62 is vulnerable; other versions may also be affected.

Affected Products

References

APP:ADOBE-CF-DIR-TRAV

Description

This signature detects an attempt to exploit a known directory traversal vulnerability in Adobe ColdFusion. This is due to a design weakness in the ColdFusion administration console that fails to properly sanitize input passed to the admin page. Remote unauthenticated attackers can exploit this to retrieve arbitrary files from the target system through directory traversal, including password file for the ColdFusion administration console. With this password file, an attacker can upload and execute arbitrary ColdFusion code within the security context of System.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Adobe ColdFusion is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. Adobe ColdFusion 9.0.1 and prior are vulnerable.

Affected Products

References

APP:HP-DATA-PROTECTOR-DOS

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector Express. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Express is prone to a privilege-escalation vulnerability. Attackers can exploit this issue to execute arbitrary code with escalated privileges or cause denial-of-service conditions. Successfully exploiting this issue may result in the complete compromise of affected computers. UPDATE (June 23, 2009): This issue was originally reported as a local vulnerability. Additional reports indicate that remote attacks are possible. The issue affects the following: HP Data Protector Express and SSE 3.x prior to build 47065 HP Data Protector Express and SSE 4.x prior to build 46537

Affected Products

References

APP:HP-DATA-PROTECTOR-SIGN-DOS

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector Media Operations SignInName Parameter. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Media Operations is prone to a remote denial-of-service vulnerability that occurs because of a NULL-pointer dereference error. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Media Operations 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:PEERCAST-FS

Description

This signature detects attempts to exploit a known vulnerability against PeerCast. A format string vulnerability in PeerCast 0.1211 and earlier allows remote attackers to execute arbitrary code through format strings sent in a URL.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

PeerCast is affected by a remote format string vulnerability. The vulnerability arises when the server attempts to handle a malformed HTTP GET request. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access. PeerCast 0.1211 and prior versions are affected by this issue.

Affected Products

References

APP:APPLE-CUPS-PNG-FILTER-OF

Description

This signature detects attempts to exploit a known vulnerability in the Apple CUPS PNG Filter. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

CUPS is prone to an integer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied PNG image sizes before using them to allocate memory buffers. Successful exploits may allow attackers to execute arbitrary code with the privileges of a user running the utilities. Failed exploit attempts likely cause denial-of-service conditions. Versions prior to CUPS 1.3.10 are vulnerable.

Affected Products

References

APP:HP-DATA-PRTCTR-EXEC_CMD-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP OpenView Storage Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP OpenView Storage Data Protector is prone to a stack-based buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue by sending specially crafted packets to TCP port 5555. Successful exploits will allow attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. HP OpenView Storage Data Protector versions 6.0, 6.10, 6.11 and 6.20 are vulnerable.

Affected Products

References

APP:RDP-BRUTE-FORCE

Description

This signature detects numerous Windows Remote Desktop Protocol (RDP) connections between two peers in a short period of time, which can be an indication of a Brute Force Attack (also known as a "Dictionary Attack"). An attacker may be attempting to guess valid credentials on an RDP-enabled Windows PC. A successful attack could result in arbitrary code execution with the privileges of the compromised credentials.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:FCKEDITOR-RCE-UPLOAD

Description

This signature detects attempts to exploit a known flaw in FCKeditor. FCKeditor is a web based open source HTML text editor. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

FCKeditor is prone to a vulnerability that lets attackers upload arbitrary files it fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Versions prior to FCKeditor 2.6.4.1 are vulnerable.

Affected Products

References

APP:EMC-APLHASTORE-FMTSTR

Description

This signature detects attempts to exploit a known vulnerability against EMC AlphaStore. Attackers can inject crafted format string characters leading to information disclosure or remote code execution.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Format string vulnerability in the _vsnsprintf function in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary code via format string specifiers in a command.

Affected Products

References

APP:UNIVERSAL-CMDB-AXIS2-RCE

Description

This signature detects attempts to exploit a known vulnerability in HP Universal CMDB Server. The vulnerability is due to an authentication weakness in the product's configuration. When the software is installed, default credentials are assigned to the Axis2 web services component. A remote attacker can leverage this vulnerability to upload a malicious web service to a target system, enabling arbitrary code execution within the security context of an Axis2 web service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:VMAUTH-FS

Description

A denial of service vulnerability has been reported in the authorization service of some VMware products. The flaw is due to a design error when processing login requests. An attacker can exploit this vulnerability by supplying malicious USER or PASS strings to the target host. Successful exploitation would result on the termination of the "vmware-authd" process causing a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

VMware Player and Workstation are prone to a remote denial-of-service vulnerability because the applications fail to perform adequate validation checks on user-supplied input. An attacker can exploit this issue to crash the 'vmware-authd' process, denying service to legitimate users. NOTE: This issue was also covered in BID 39345 (VMware Hosted Products VMSA-2010-0007 Multiple Remote and Local Vulnerabilities); this BID is being retained to properly document the issue.

Affected Products

References

APP:WEBSENSE-TRITON-RCE

Description

This signature detects attempts to exploit a known flaw in Websense Triton. A successful attack would result in SYSTEM-level command execution. This vector is normally protected by SSL/TLS encryption. In such cases, in order for the IDP to protect your server, the SSL private key must be loaded on the IDP, the SSL Forward Proxy feature must be utilized, or some other SSL off-loading system must be used.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Websense Triton is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.

Affected Products

References

APP:QUEST-BIG-BRO-FD

Description

This signature detects attempts to exploit a known vulnerability in the Quest Software Big Brother bbntd.exe component. These vulnerabilities allow a remote attacker to delete or overwrite arbitrary files using the "page" and "ack addtag_event" commands, respectively. A successful attack can result in execution of arbitrary code with privileges up to and including SYSTEM, depending on the file being replaced.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:HP-DATA-PRTCTR-EXEC_SETUP

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector. A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP OpenView Storage Data Protector is prone to multiple remote code-execution vulnerabilities that affect the Cell Manager and Client components. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

References

APP:RIM-BLACKBERRY-DOS

Description

This signature detects a packet creating a denial of service in the RIM BlackBerry Server product. The communication between BlackBerry routers can be disrupted by sending crafted Service Routing Protocol (SRP) messages. A remote unauthenticated attacker can cause a denial-of- service condition of the BlackBerry service.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The Blackberry Enterprise Server Router component is prone to a denial of service vulnerability. This vulnerability may be triggered by sending malformed SRP (Server Routing Protocol) packets to the Router. This could only be exploited by an attacker who can communicate with the Router.

Affected Products

References

APP:KINDLE-BROWSER-NPAPI-RCE

Description

This signature detects attempts to exploit a known vulnerability against Kindle Touch Browser. A successful attack can lead to arbitrary code execution. Version 5.1.0 is affected by this vulnerability.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:HP-DATA-PRTCTR-RDS-DOS

Description

This signature detects attempts to exploit a known vulnerability against HP Data Protector. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Manager is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the affected application, denying service to legitimate users. HP Data Protector Manager 6.11 is vulnerable; other versions may also be affected.

Affected Products

References

APP:NOW-SMS-OF-MSF

Description

This signature detects attempts to exploit a known vulnerability against Now Wireless Now SMS/MMS Gateway. Attackers can execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. This signature is based of the public PoC available in Metasploit Exploit Framework.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:APPLE-SIRI

Description

This signature detects the Apple Siri application being used. Siri is a natural-language voice recognition system used to interact with Apple iPhone and similar products in order to find information, make appointments, set reminders, and similar personal assistant functions. Its use on your network may be a violation of your organization's Acceptable Use Policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:SPREECOMMERCE-RCE

Description

This signature detects attempts to exploit a known flaw in Spreecommerce related to the api/orders.json script in the search functions of the rd_searchlogic gem, which may allow a remote attacker to execute arbitrary commands.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:INTERSYSTEMS-CACHE-OF

Description

This signature detects attempts to exploit a known flaw in InterSystems Cache server. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

InterSystems Cache is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts will result in denial-of-service conditions. InterSystems Cache 2009.1 is vulnerable; other versions may also be affected.

Affected Products

References

APP:CHKPOINT-FW-WEBUI-REDIRECT

Description

This signature detects attempts to exploit a known vulnerability in the CheckPoint Firewall WebUI. It is due to insufficient validation of user-supplied input. A successful exploit may aid in phishing attacks, other attacks are possible.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:BOMBER-BO

Description

This signature detects attempts to exploit a known vulnerability in the Bomberclone. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user that is running the application. This signature is based on the public PoC in the Metasploit Framework.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

BomberClone is prone to a buffer-overflow vulnerability. This issue is due to a failure in the application to perform proper boundary checks on user-supplied data before storing it in a finite sized buffer. This issue may be exploited to execute arbitrary code in the context of the user who is running the application. Version 0.11.6.2 is vulnerable; other versions may also be affected.

Affected Products

References

APP:MAL-AFP-DSI-REQ

Description

This signature detects malformed Apple Filing Protocol requests. Certain products, such as Novell Netware, are vulnerable to such requests. Successful attacks could result in a denial-of-service condition or possibly remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Novell NetWare is prone to multiple remote denial-of-service vulnerabilities. A remote attacker can exploit these issues to consume an excessive amount of resources or to crash the affected computer, denying service to legitimate users. NetWare 6.5 SP8 is vulnerable; other versions may also be affected.

Affected Products

References

APP:NOW-SMS-OF

Description

This signature detects attempts to exploit a known vulnerability in the Now SMS MMS Gateway. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the administrator.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Now SMS/MMS Gateway is prone to multiple buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied input before copying it to insufficiently sized buffers. Successfully exploiting these issues will allow an attacker to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely crash the application. These issues affect Now SMS/MMS Gateway 2007.06.27 and prior versions.

Affected Products

References

APP:TRACKERCAM-OF

Description

This signature detects attempts to exploit a known flaw in TrackerCam. A successful attack results in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

TrackerCam is prone to multiple remote vulnerabilities, including buffer-overflow issues, a directory-traversal issue, an information-disclosure issue, an HTML-injection issue, and denial-of-service issues. A remote attacker could exploit these issues to execute arbitrary code, obtain potentially sensitive information, launch phishing attacks or steal cookie based authentication credentials, and deny service to legitimate users.

Affected Products

References

APP:QNX-QCONN-CMDEXEC

Description

This signature detects attempts to exploit a known vulnerability against QNX QCONN. An attacker could inject arbitrary system commands and execute them with "root" privileges on the targeted system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:CAIN-ABEL-CISCO-IOS-BOF

Description

This signature detects attempts to exploit a known vulnerability against Cain & Abel Cisco IOS. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

APP:HP-MGMT-UAM-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP Intelligent Management Center uam component. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:XEROX-WORKCENTRE-BOF

Description

This signature detects attempts to exploit a known vulnerability against Xerox WorkCentre. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Xerox WorkCentre is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code with the privileges of the application or crash the affected application. Xerox WorkCentre 4150 is vulnerable; other versions may also be affected.

Affected Products

References

APP:VERITAS-ADMIN-BO

Description

This signature detects attempts to exploit a known vulnerability in Symantec VERITAS Storage Foundation. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Symantec Storage Foundation is prone to a remote heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue occurs in the Symantec Veritas Enterprise Administrator (VEA) component. An attacker can exploit this issue to execute arbitrary code in the context of the SYSTEM user. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition.

Affected Products

References

APP:BULLETPROOF-FTP-BPS-BOF

Description

This signature detects attempts to exploit a known vulnerability in the BulletProof FTP Client Malformed bps File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

BulletProof FTP Client is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition. BulletProof FTP 2.63 build 56 is vulnerable; other versions may also be affected.

Affected Products

References

APP:MCAFEE-EBUSINESS-RCE

Description

This signature detects attempts to exploit a known vulnerability against McAfee E-Business Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

McAfee E-Business Server is prone to a remote code-execution vulnerability that occurs prior to authentication. Attackers can leverage this issue to execute arbitrary code with superuser privileges. Successful exploits will completely compromise affected computers. Failed attacks will cause denial-of-service conditions. E-Business Server 8.5.2 and prior versions are vulnerable. NOTE: This issue may be related to the issue described in BID 26269 (McAfee E-Business Server Authentication Packet Handling Integer Overflow Vulnerability).

Affected Products

References

APP:HP-INODEMNGCHECKER-EXE-BOF

Description

This signature detects attempts to exploit a known vulnerability against HP iNode Management Center. A successful attack allows the attacker to execute arbitrary code within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The HP Intelligent Management Center User Access Manager (UAM) and Endpoint Admission Defense (EAD) products are prone to a remote code-execution vulnerability. An attacker can exploit this vulnerability to execute arbitrary code in the context of the SYSTEM user. Failed attacks will cause denial-of-service conditions. The issue affects the following versions: HP Intelligent Management Center User Access Manager (UAM) v5.0 (E0101) and prior. HP Intelligent Management Center Endpoint Admission Defense (EAD) v5.0 (E0101) and prior.

Affected Products

References

APP:EIQ-NET-SEC-ANALYZER-DOS

Description

This signature detects attempts to exploit a known vulnerability against EIQ Networks Security Analyzer. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

EIQ Networks Security Analyzer is prone to a denial-of-service vulnerability. A malicious server could cause a vulnerable client application to crash, effectively denying service.

Affected Products

References

APP:RSLOGIX-RSVCHOST-DOS

Description

This signature detects attempts to exploit a known vulnerability in the Rockwell RSLogix RsvcHost.exe. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

RSLogix is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash the application, denying service to legitimate users. RSLogix 5000 is vulnerable. Other versions may also be affected.

Affected Products

References

APP:DISKPULSE-GETSERVERINFO-OF

Description

This signature detects attempts to exploit a known remote code-execution vulnerability in DiskPulse Server. It is because it fails to properly bounds-check user-supplied data. Specifically, a buffer-overflow condition occurs when an overly long string is provided in the "GetServerInfo" request. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts can cause denial-of-service conditions.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

DiskPulse Server is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. DiskPulse Server 2.2.34 is vulnerable; other versions may also be affected.

Affected Products

References

APP:CDE-DTSPCD-OF

Description

This signature detects attempts to exploit a known vulnerability against CDE, a Motif-based GUI for UNIX systems. Attackers can use dtspcd, a server program that listens on TCP/6112, to overflow the buffer in the libDtSvc library and gain administrative privileges. This signature can also trigger on Bittorent traffic running on TCP/6112.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

CDE is a Motif-based graphical user environment for UNIX systems. It is shipped with a number of commercial systems. A buffer-overflow vulnerability in the 'dtspcd' component may allow a remote attacker to gain administrative privileges on the affected host. The overflow is believed to be in the libDtSvc library, which used by the 'Subprocess Control Service'. The overflow is exploitable through the 'dtspcd' service,a server utility that facilitates remote invocation of CDE utilities and commands. The 'dtspcd' service listens on TCP port 6112, runs with root privileges, and is enabled by default (through 'inetd') on many systems.

Affected Products

References

APP:POSTFIX-GREYLISTD-OF

Description

This signature detects attempts to exploit a known vulnerability in the Postfix Greyisting daemon. A successful exploit can lead to a buffer overflow and remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

It is reported that GLD contains a buffer overflow vulnerability. This issue is due to a failure of the application to properly ensure that a fixed-size memory buffer is sufficiently large prior to copying user-supplied input data into it. Remote attackers may exploit this vulnerability to cause arbitrary machine code to be executed in the context of the affected service. As the service is designed to be run as the superuser, remote attackers may gain superuser privileges on affected computers. GLD version 1.4 is reportedly affected, but prior versions may also be affected.

Affected Products

References

APP:IA-WEBMAIL-OF

Description

This signature detects attempts to exploit a known flaw in IA WebMail. A successful attack could result in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0.110090709+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

IA WebMail Server is said to be prone to a remote buffer overrun that could allow an attacker to execute arbitrary code. The problem occurs due to insufficient bounds checking when handling GET requests. As a result, an attacker may be capable of overrunning the bounds of an internal memory buffer and effectively control the flow of execution.

Affected Products

References

APP:VIDEOSPIRIT-OF

Description

This signature detects attempts to exploit a known vulnerability in the VideoSpirit Pro. A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:SAFENET-VPN-OF

Description

This signature detects attempts to exploit a known vulnerability in the SafeNet IKE module. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

SafeNet SoftRemote is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. Versions prior to SoftRemote 10.8.6 are vulnerable.

Affected Products

References

APP:ISCSI-TARGET-OF

Description

This signature detects attempts to exploit a known stack buffer overflow vulnerability in iSCSI Enterprise. It is caused by insufficient boundary checking while processing SCN messages. A remote attacker can leverage this to inject and execute arbitrary code on a vulnerable system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Multiple implementations of iSCSI Enterprise Target are prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: iSCSI Enterprise Target 1.4.20.1 and prior Generic SCSI Target Subsystem for Linux 1.0.1.1 and prior Linux SCSI target framework 1.0 and prior

Affected Products

References

APP:VMWARE-SPRING-CLASSLOADER

Description

This signature detects attempts to exploit a known remote code execution vulnerability in VMware SpringSource. It is due to a design weakness in the Web application framework. A remote attacker can leverage this weakness by sending a crafted HTTP request to a target system. A successful attack results in arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Spring Framework is prone to a remote code-injection vulnerability. An attacker can exploit this issue to inject and execute arbitrary malicious Java code within the context of the affected application. Successful exploits will compromise the affected application and the underlying system; other attacks are also possible. Versions of Spring Framework prior to 3.03, 2.5.6.SEC02, and 2.5.7.SR01 are vulnerable.

Affected Products

References

APP:MERCURY-PH-BO

Description

This signature detects attempts to exploit a known vulnerability against Mercury PH Server Module. Attackers can execute arbitrary machine code with SYSTEM privileges in the context of the affected server process.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Mercury Mail is prone to a remote buffer-overflow vulnerability in its mailbox name service. This issue occurs because the application fails to properly bounds-check user-supplied input before copying it to a finite-sized memory buffer. Exploiting this vulnerability allows remote attackers to execute arbitrary machine code with SYSTEM privileges in the context of the affected server process. Mercury Mail 4.01b is affected; other versions may also be affected.

Affected Products

References

APP:YOUSENDIT-ENCRYPTED

Description

This signature detects the YouSendIt file sharing application. Such activity can be a violation of your organization's acceptable use policy.

Severity

INFO

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:BAKBON-NETVAULT-HEAP-OF

Description

This signature detects attempts to exploit a known vulnerability against the BakBone NetVault Application. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the NetVault service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:HP-DATA-PROTECTOR-FIN-SQL

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1296.

Affected Products

References

APP:HP-DATA-PROTECTOR-REQ-SQL

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1226.

Affected Products

References

APP:HP-DATA-PROTECTOR-GET-SQL

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1225.

Affected Products

References

APP:EMC-ALPHASTORE-CMDEXEC

Description

This signature detects attempts to exploit a known vulnerability against EMC AlphaStore. Attackers can inject and execute arbitrary commands on the targeted system.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The NetWorker command processor in rrobotd.exe in the Device Manager in EMC AlphaStor 4.0 before build 800 allows remote attackers to execute arbitrary commands via a DCP "run command" operation.

Affected Products

References

APP:FLASH-SRV-DOS

Description

This signature detects attempts to exploit a known vulnerability against a Macromedia Flash server. The vulnerability exists due to an error in the way that the affected server handles malformed data. An attacker can send a crafted message to the server causing its termination, thereby creating a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Macromedia Flash Media Server administration service is prone to a remote denial of service vulnerability. Successful exploitation may trigger a crash or hang, denying service to legitimate users.

Affected Products

References

APP:EMC-AUTOSTART-BOF

Description

This signature detects attempts to exploit a known vulnerability against EMC AutoStart Error Logging. A successful attack can lead to a stack-based overflow and arbitrary remote code execution within the context of the affected application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

EMC AutoStart is prone to multiple buffer-overflow vulnerabilities. Attackers can leverage these issues to execute arbitrary code with SYSTEM-level privileges. Successfully exploiting these issues will result in the complete compromise of affected computers. Failed exploit attempts may cause denial-of-service condition.

Affected Products

References

APP:EMC-NETWORKER-NSRD-BO

Description

This signature detects attempts to exploit a known flaw in EMC NetWorker. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:HP-PROCURVE-FUPLOAD-SSL

Description

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

UpdateDomainControllerServlet in the SNAC registration server in HP ProCurve Manager (PCM) 3.20 and 4.0, PCM+ 3.20 and 4.0, and Identity Driven Manager (IDM) 4.0 does not properly validate the adCert argument, which allows remote attackers to upload .jsp files and consequently execute arbitrary code via unspecified vectors, aka ZDI-CAN-1743.

Affected Products

References

APP:DIGIUM-IAX2-DOS

Description

This signature detects attempts to exploit a known vulnerability against Digium Asterisk IAX2 Call Number. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Asterisk is prone to a remote denial-of-service vulnerability because it fails to properly handle an excessive amount of call numbers. Successful exploits can cause the application to stop accepting connections, resulting in denial-of-service conditions for legitimate users.

Affected Products

References

APP:MCAFEE-ORCHESTRATOR-FS

Description

This signature detects attempts to exploit a known vulnerability against Mcafee ePolicy Orchestrator. Attackers can send unauthenticated UDP packets containing format strings, which allows the attacker to execute arbitrary code on the victim's machine.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

McAfee Framework is prone to a remote format-string vulnerability. Exploiting this issue will allow attackers to execute arbitrary code with the permissions of the framework or of an application that uses the framework. Failed attacks will likely cause denial-of-service conditions. McAfee Common Managemetn Agent 3.6.0.574 (Patch3) or earlier, McAfee Agent (MA) 4.0, Framework 2.6.0.569 and ePolicy Orchestrator 4.0 are vulnerable to this issue; other versions may also be affected. NOTE: This issue occurs only when the default debug level (7) is raised to 8.

Affected Products

References

APP:MCAFEE-ORCH-BO

Description

This signature detects attempts to exploit a known vulnerability in McAfee ePolicy Orchestrator. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

McAfee Common Management Agent is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users.

Affected Products

References

APP:ASUS-DPC-PROXY-BO

Description

This signature detects attempts to exploit a known vulnerability in ASUS DPC Proxy Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

ASUS Remote Console is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. ASUS Remote Console 2.0.0.19 is vulnerable; other versions may also be affected.

Affected Products

References

APP:RDP-ISO-RECV-MSG-IUF

Description

This signature detects attempts to exploit a known vulnerability against Rdesktop program. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The 'rdesktop' program is prone to multiple remote memory-corruption vulnerabilities because it fails to properly validate incoming packets. A remote attacker can exploit these issues to execute arbitrary code in the context of the currently logged-in user. These issues affect rdesktop 1.5.0; other versions may also be vulnerable.

Affected Products

References

APP:DELL-OPENMANAGE-BO

Description

This signature detects attempts to exploit a known vulnerability against Dell OpenManage Web Server 3.4.0. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Heap-based buffer overflow in Dell OpenManage Web Server 3.4.0 allows remote attackers to cause a denial of service (crash) via a HTTP POST with a long application variable.

Affected Products

References

APP:GROK-NETPROXY-SEC-BYPASS

Description

This signature detects attempts to exploit a known vulnerability against Grok NetProxy. A successful attack can allow attackers to perform security restriction bypass.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

NetProxy is prone to a security-restriction-bypass vulnerability because the software fails to properly sanitize user-supplied input. Attackers can exploit this issue to bypass the security restrictions and gain unauthorized access to restricted sites. This may allow attackers to bypass the security restrictions enforced by the application. NetProxy version 4.03 is vulnerable; other versions may also be affected.

Affected Products

References

APP:ACOUSTICA-MIXCRFT-MX4-FL-BO

Description

This signature detects attempts to exploit a known vulnerability in Acoustica Mixcraft music production application. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Acoustica Mixcraft is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue by enticing a victim to load a malicious '.mx4' file. If successful, the attacker can execute arbitrary code in the context of the affected application. Acoustica Mixcraft 4.2 is vulnerable; other versions may also be affected.

Affected Products

References

APP:NOW-SMS-GW-OF

Description

This signature detects attempts to exploit a known vulnerability in the Now SMS/MMS Gateway. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of targeted user. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Multiple stack-based buffer overflows in Now SMS/MMS Gateway 2007.06.27 and earlier allow remote attackers to execute arbitrary code via a (1) long password in an Authorization header to the HTTP service or a (2) large packet to the SMPP service.

Affected Products

References

APP:APPIAN-BPM-SUITE-DOS

Description

This signature detects attempts to exploit a known vulnerability against Appian Business Process Management Suite. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Appian Business Process Management Suite (BPMS) is prone to a remote denial-of-service vulnerability because it fails to handle specially crafted packets. Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users. This issue affects Appian BPMS 5.6 SP1; other versions may be vulnerable as well.

Affected Products

References

APP:ZLIB-COMPRES-LIB-DOS

Description

This signature detects attempts to exploit a known vulnerability against Zlib Compression Library. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The Zlib compression library is reportedly susceptible to a denial of service vulnerability. This vulnerability is caused by a failure of the application to properly handle malformed input during the decompression process. This vulnerability is reported to exist in version 1.2.1 of the library. Other versions are also likely affected.

Affected Products

References

APP:GFI-FAXMAKER-DOS

Description

This signature detects attempts to exploit a known vulnerability against GFI Faxmaker. A successful attack can result in a denial-of-service condition.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

GFI Faxmaker is prone to a denial-of-service vulnerability when handling malformed '.fax' files. Successfully exploiting this issue allows remote attackers to deny service to legitimate users. GFI Faxmaker 10.0 Build 237 is affected; other versions may also be vulnerable.

Affected Products

References

APP:INTELLITAMPER-HREF-BO

Description

This signature detects attempts to exploit a known vulnerability in IntelliTamper. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

IntelliTamper is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This issue allows remote attackers to execute arbitrary machine code in the context of the application. Failed exploit attempts will likely crash the application, denying service to legitimate users. IntelliTamper 2.07 is vulnerable; other versions may also be affected.

Affected Products

References

APP:BULLETPROOF-FTP-CLNT-BM-BO

Description

This signature detects attempts to exploit a known vulnerability in BulletProof FTP Client. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

BulletProof FTP Client is prone to a heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition. BulletProof FTP Client 2.63 is vulnerable; other versions may also be affected.

Affected Products

References

APP:BULLETPROOF-FTP-BPS-FILE-BO

Description

This signature detects attempts to exploit a known vulnerability in BulletProof FTP Client. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

BulletProof FTP Client is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker may exploit this issue to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in a denial-of-service condition.

Affected Products

References

APP:AUDACITY-AUP-BO

Description

This signature detects attempts to exploit a known vulnerability in the Audacity. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Audacity is prone a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts likely result in denial-of-service conditions. NOTE (August 25, 2009): This BID had wrongly referred to Audacity 1.6.2, but now correctly refers to the affected version: Audacity 1.2.6. Audacity 1.2.6 is vulnerable; other versions may also be affected.

Affected Products

References

APP:ASHAMPOO-BURN-SDO-ASHPRJ-BO

Description

This signature detects attempts to exploit a known vulnerability in Ashampoo Burning Studio. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Burning Studio Elements is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the user running the application. Failed exploit attempts likely result in denial-of-service conditions. Burning Studio Elements 10.0.9 is vulnerable; other versions may also be affected.

Affected Products

References

APP:ACRONIS-TRU-IMG-ECO-SRV-DOS

Description

This signature detects attempts to exploit a known vulnerability against Acronis True Image Echo Enterprise Server. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Acronis True Image Echo Enterprise Server is prone to multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to crash the affected application, denying service to legitimate users.

Affected Products

References

APP:INTELLITAMPER-LCTION-HDR-BO

Description

This signature detects attempts to exploit a known vulnerability in IntelliTamper. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

IntelliTamper is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. This issue allows remote attackers to execute arbitrary machine code in the context of the application. Failed exploit attempts will likely crash the application, denying service to legitimate users. IntelliTamper 2.07 is vulnerable; other versions may also be affected.

Affected Products

References

APP:ICARUS-PGN-FILE-BO

Description

This signature detects attempts to exploit a known vulnerability in the Internet Chess Club client application called Icarus. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Icarus is prone to a remote stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Icarus 2.0 is vulnerable; other versions may also be affected.

Affected Products

References

APP:GOOLE-SKETCHUP-3DS-FILE-MC

Description

This signature detects attempts to exploit a known vulnerability against Google SketchUp. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Google SketchUp is prone to a remote memory corruption vulnerability because the application fails to perform adequate boundary checks on user-supplied input. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Google SketchUp 7.0.10247, 7.1.4871, and 7.1.6087 are vulnerable; other versions may also be affected.

Affected Products

References

APP:APPLE-QT-NULL-DOS

Description

This signature detects attempts to exploit a known vulnerability against Apple QuickTime. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Apple QuickTime is prone to a denial-of-service vulnerability. Note that an attacker will exploit this issue through the Safari browser by enticing a user to visit a malicious site. This will crash the user's browser. Successful exploits may allow the attacker to crash the affected application, denying service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed.

Affected Products

References

APP:AVAYA-CCRWEBCLIENT-RCE

Description

This signature detects attempts to exploit a known vulnerability in the Avaya IP Office Customer Call Reporter. A successful attack can lead to arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Avaya IP Office Customer Call Reporter is prone to a remote code-execution vulnerability. Attackers can leverage this issue to execute arbitrary code with the privileges of the user running the affected application. Avaya IP Office Customer Call Reporter 7.0 and 8.0 are vulnerable; other versions may also be affected.

Affected Products

References

APP:PROGEA-MOVICON-BO

Description

This signature detects attempts to exploit a known vulnerability in the Progea Movicon. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Heap-based buffer overflow in Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request.

Affected Products

References

APP:BAKBON-NETVAULT-INT-OF

Description

This signature detects attempts to exploit a known vulnerability against the BakBone NetVault Application. Attackers, using a maliciously crafted computer name and length, can exploit this vulnerability leading to arbitrary remote code execution withing the context of the NetVault service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

NetVault is reported prone to a remote heap overflow vulnerability. A successful attack can allow remote attackers to execute arbitrary code on a vulnerable computer to gain unauthorized access. This issue has been confirmed in NetVault 7 packages running on Windows platforms. Other versions of NetVault running on different platforms may be affected as well.

Affected Products

References

APP:LANDESK-THINKMGT-DIRTRVRSAL

Description

This signature detects attempts to exploit a known vulnerability against LANDesk ThinkManagement Suite. Attackers can traverse arbitrary directories on the server resulting in the attacker accessing areas of the system otherwise unintended to be accessed externally.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Lenovo ThinkManagement Console is prone to multiple security-bypass vulnerabilities. Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions. Lenovo ThinkManagement Console 9.0.3 is vulnerable; other versions may also be affected.

Affected Products

References

APP:HP-DATA-PROTECTOR-SQL

Description

This signature detects attempts to exploit a known vulnerability in HP Data Protector. Attackers can execute arbitrary SQL commands on the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Unspecified vulnerability in HP Data Protector Notebook Extension 6.20 and Data Protector for Personal Computers 7.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1222.

Affected Products

References

APP:LENOVO-RCE-UPLOAD

Description

This signature detects attempts to exploit a known vulnerability in the Lenovo ThinkManagement Console. A successful attack can lead to arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Lenovo ThinkManagement Console is prone to multiple security-bypass vulnerabilities. Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions. Lenovo ThinkManagement Console 9.0.3 is vulnerable; other versions may also be affected.

Affected Products

References

APP:NOVELL-EDIR-LEN-DOS

Description

A denial of service vulnerability exists for Novell eDirectory. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to the vulnerable server. This can cause the service to consume an excessive amount of memory, creating a denial of service condition in the process.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Novell eDirectory is prone to a denial-of-service vulnerability. Remote attackers can exploit this issue to crash the application, denying service to legitimate users.

Affected Products

References

APP:CUPS-IPP-RCE

Description

This signature detects attempts to exploit a known vulnerability against implementation of Internet Printing Protocol (IPP) of the Common Unix Printing System (CUPS). A successful attack can lead to arbitrary code execution.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

CUPS server is prone to a remote memory-corruption vulnerability because it fails to properly parse Internet Printing Protocol (IPP) packets. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed attacks may cause a denial-of-service condition. CUPS versions prior to 1.3.7-18 are vulnerable.

Affected Products

References

APP:HP-STORAGEWORKS-BO

Description

This signature detects attempts to exploit a known vulnerability in the HP StorageWorks. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The HP StorageWorks File Migration Agent is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code. Successful exploits will completely compromise affected computers.

Affected Products

References

APP:VMWARE-VCENTER-CHARGEBACK

Description

This signature detects attempts to exploit a known vulnerability against Vmware vCenter Chargeback Manager. A successful attack can lead to arbitrary code execution.

Severity

CRITICAL

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

VMware vCenter Chargeback Manager (aka CBM) before 2.5.1 does not proper handle uploads, which allows remote attackers to execute arbitrary code via unspecified vectors.

Affected Products

References

APP:ABB-NETSCANHOST-OF

Description

This signature detects attempts to exploit a known vulnerability in ABB Product. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Multiple ABB products are prone to a stack-based buffer-overflow vulnerability because they fail to perform adequate boundary checks on user-supplied data. Attackers may exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. The following products and versions are affected: • ABB Interlink Module versions 4.6 through 4.9 • IRC5 OPC Server versions up to and including 5.14.01 • PC SDK versions up to and including 5.14.01 • PickMaster 3 versions up to and including 3.3 • PickMaster 5 versions up to and including 5.13 • Robot Communications Runtime versions up to and including 5.14.01 • RobotStudio versions supporting IRC5 up to and including 5.14.01 • RobView 5 • WebWare SDK versions 4.6 through 4.9 • WebWare Server versions 4.6 through 4.91

Affected Products

References

APP:EMC-NETWORKER-NSRINDEXD-OF

Description

This signature detects attempts to exploit a known vulnerability in EMC NetWorker. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

EMC NetWorker is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following EMC NetWorker versions are vulnerable: EMC NetWorker Server 7.5.x EMC NetWorker Server 7.6.x

Affected Products

References

APP:FREEPBX-FILE-UPLOAD

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Recording Interface. A successful attack can lead to arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

FreePBX is prone to an arbitrary file-upload vulnerability because it fails to properly sanitize user-supplied input. An attacker can leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the webserver. FreePBX 2.8.0 is vulnerable; other versions may also be affected.

Affected Products

References

APP:BLUECOAT-AAA-OF

Description

This signature detects attempts to exploit a known vulnerability in the Blue Coat Authentication and Authorization Agent. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the service.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:GE-PROFICY-RT-DIRTRAVERSAL

Description

This signature detects attempts to exploit a known vulnerability against GE Proficy Real-Time Information Portal. Attackers can traverse directories on the server resulting in the attacker accessing areas of the system otherwise unintended to be accessed externally.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

GE Proficy Real-Time Information Portal is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data. Exploiting the issue may allow an attacker to overwrite arbitrary files on the affected system. This could aid in further attacks. GE Proficy Real-Time Information Portal versions 3.0 and 2.6 are vulnerable.

Affected Products

References

APP:ASTIUM-PBX-DOS

Description

This signature detects attempts to exploit a known vulnerability against Astium PBX application. A successful attack can result in a denial-of-service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

References

APP:VMWARE-ESX-SOAP-DOS

Description

This signature detects a known denial of service vulnerability in the VMware ESX and ESXi server. It is due to improper handling of certain SOAP requests in the vSphere API. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted messages to the affected server. Successful exploitation would result in a denial of service condition.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The vSphere API in VMware ESXi 4.1 and ESX 4.1 allows remote attackers to cause a denial of service (host daemon crash) via an invalid value in a (1) RetrieveProp or (2) RetrievePropEx SOAP request.

Affected Products

References

APP:NOVELL-NET-FTP-DEL-CMD-OF

Description

This signature detects attempts to exploit a known stack buffer overflow vulnerability in Novell Netware FTP Server. It is due to insufficient bound checking on a user-supplied buffer length value in a DELE Command. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Novell Netware is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary code with kernel privileges. Failed attacks may cause a denial-of-service condition.

Affected Products

References

APP:FREEPBX-RECORDING-RCE

Description

This signature detects attempts to exploit a known vulnerability in the FreePBX Recordings Interface. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

FreePBX is prone to a remote code-execution vulnerability. Successfully exploiting this issue will allow attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. FreePBX 2.8.0 and prior versions are vulnerable.

Affected Products

References

APP:HP-LIPS-HSSPD

Description

This signature detects attempts to exploit a known vulnerability against HP Linux Imaging and Printing System. Versions 2.7.9 and below are vulnerable. A successful attack can allow attackers to inject commands onto the target system.

Severity

MEDIUM

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Linux Imaging and Printing System (HPLIP) is prone to an arbitrary command-execution vulnerability because it fails to adequately sanitize user-supplied input. Attackers can exploit this issue to execute arbitrary commands with superuser privileges. Successful attacks will completely compromise affected computers. NOTE: By default the application's 'hpssd' daemon listens only on localhost, but it can be configured (via /etc/hp/hplip.conf) to listen to remote requests as well. HPLIP versions in the 1.0 and 2.0 series are vulnerable.

Affected Products

References

APP:GIMP-SCRIPTFU-OF

Description

This signature detects attempts to exploit a known vulnerability in the GIMP Script-Fu server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted daemon.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

GIMP is prone to a buffer-overflow vulnerability. Successfully exploiting this issue may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. GIMP versions 2.6.12 and prior are vulnerable.

Affected Products

References

APP:HP-DATA-PROC-NEW-FOLDER

Description

This signature detects attempts to exploit a known vulnerability in the HP Data Protector. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

HP Data Protector Express is prone to multiple code-execution vulnerabilities. Successfully exploiting these issues allow an attacker to execute arbitrary code with SYSTEM privileges. HP Data Protector Express versions prior to 5.0.00 build 59287 and prior to 6.0.00 build 11974 are vulnerable.

Affected Products

References

APP:2WIRE-DSL-VULN

Description

This signature detects attempts to exploit a known vulnerability in 2Wire DSL routers. An attacker can create a malicious Web site containing dangerous hyperlinks, which if accessed by a victim, allows the attacker to gain control of the victim's DSL router.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Multiple 2Wire routers are prone to an access-validation vulnerability because they fail to adequately authenticate users before performing certain actions. Unauthenticated attackers can leverage this issue to change the password of arbitrary user accounts on the router. Successful attacks will completely compromise affected devices. 2Wire routers that have the 'H04_POST' page are affected by this issue. UPDATE: This BID has been retired because it has been found to be a duplicate of BID 27246 (2Wire Routers Cross-Site Request Forgery Vulnerability). UPDATE (February 1, 2008): This BID is being reinstated. Further investigation and new information reveal that this vulnerability differs from the one described in BID 27246.

Affected Products

References

APP:DISTCC-EXEC

Description

This signature detects attempts to exploit a known vulnerability in the Distributed C Compilation system implemented in Samba Distcc and Apple XCode. A successful attack can allow an attacker to remotely execute arbitrary commands.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

The access controls for the 'distcc' program may malfunction under certain circumstances and may not be enforced. A remote attacker may potentially exploit this vulnerability to access the affected 'distcc' service, regardless of access-control rules that are set in place. This vulnerability is addressed in 'distcc' 2.16.

Affected Products

References

APP:EMC-NSRINDEXD-BO

Description

This signature detects attempts to exploit a known vulnerability in EMC NetWorker. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Severity

HIGH

Group

APP

Supported By

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+

Extended Description

Buffer overflow in nsrindexd in EMC NetWorker 7.5.x and 7.6.x before 7.6.5, and 8.x before 8.0.0.6, allows remote attackers to execute arbitrary code via crafted SunRPC data.

Affected Products