zeek/scripts/s2b/snort_rules2.2/sid-msg.map

2431 lines
164 KiB
Text

# $Id: sid-msg.map 91 2004-07-15 08:13:57Z rwinslow $
# Format: SID || MSG || Optional References || Optional References ...
# SID -> MSG map
103 || BACKDOOR subseven 22 || url,www.hackfix.org/subseven/ || arachnids,485
104 || BACKDOOR - Dagger_1.4.0_client_connect || url,www.tlsecurity.net/backdoor/Dagger.1.4.html || arachnids,483
105 || BACKDOOR - Dagger_1.4.0 || url,www.tlsecurity.net/backdoor/Dagger.1.4.html || arachnids,484
106 || BACKDOOR ACKcmdC trojan scan || arachnids,445
107 || BACKDOOR subseven DEFCON8 2.1 access
108 || BACKDOOR QAZ Worm Client Login access || MCAFEE,98775
109 || BACKDOOR netbus active || arachnids,401
110 || BACKDOOR netbus getinfo || arachnids,403
111 || BACKDOOR netbus getinfo || arachnids,403
112 || BACKDOOR BackOrifice access || arachnids,400
113 || BACKDOOR DeepThroat access || arachnids,405
114 || BACKDOOR netbus active || arachnids,401
115 || BACKDOOR netbus active || arachnids,401
116 || BACKDOOR BackOrifice access || arachnids,399
117 || BACKDOOR Infector.1.x || arachnids,315
118 || BACKDOOR SatansBackdoor.2.0.Beta || arachnids,316
119 || BACKDOOR Doly 2.0 access || arachnids,312
120 || BACKDOOR Infector 1.6 Server to Client
121 || BACKDOOR Infector 1.6 Client to Server Connection Request
122 || BACKDOOR DeepThroat 3.1 System Info Client Request || arachnids,106
124 || BACKDOOR DeepThroat 3.1 FTP Status Client Request || arachnids,106
125 || BACKDOOR DeepThroat 3.1 E-Mail Info From Server || arachnids,106
126 || BACKDOOR DeepThroat 3.1 E-Mail Info Client Request || arachnids,106
127 || BACKDOOR DeepThroat 3.1 Server Status From Server || arachnids,106
128 || BACKDOOR DeepThroat 3.1 Server Status Client Request || arachnids,106
129 || BACKDOOR DeepThroat 3.1 Drive Info From Server || arachnids,106
130 || BACKDOOR DeepThroat 3.1 System Info From Server || arachnids,106
131 || BACKDOOR DeepThroat 3.1 Drive Info Client Request || arachnids,106
132 || BACKDOOR DeepThroat 3.1 Server FTP Port Change From Server || arachnids,106
133 || BACKDOOR DeepThroat 3.1 Cached Passwords Client Request || arachnids,106
134 || BACKDOOR DeepThroat 3.1 RAS Passwords Client Request || arachnids,106
135 || BACKDOOR DeepThroat 3.1 Server Password Change Client Request || arachnids,106
136 || BACKDOOR DeepThroat 3.1 Server Password Remove Client Request || arachnids,106
137 || BACKDOOR DeepThroat 3.1 Rehash Client Request || arachnids,106
138 || BACKDOOR DeepThroat 3.1 Server Rehash Client Request || arachnids,106
140 || BACKDOOR DeepThroat 3.1 ICQ Alert OFF Client Request || arachnids,106
141 || BACKDOOR HackAttack 1.20 Connect
142 || BACKDOOR DeepThroat 3.1 ICQ Alert ON Client Request || arachnids,106
143 || BACKDOOR DeepThroat 3.1 Change Wallpaper Client Request || arachnids,106
144 || FTP ADMw0rm ftp login attempt || arachnids,01
145 || BACKDOOR GirlFriendaccess || arachnids,98
146 || BACKDOOR NetSphere access || arachnids,76
147 || BACKDOOR GateCrasher || arachnids,99
148 || BACKDOOR DeepThroat 3.1 Keylogger Active on Network || arachnids,106
149 || BACKDOOR DeepThroat 3.1 Client Sending Data to Server on Network || arachnids,106
150 || BACKDOOR DeepThroat 3.1 Server Active on Network || arachnids,106
151 || BACKDOOR DeepThroat 3.1 Client Sending Data to Server on Network || arachnids,106
152 || BACKDOOR BackConstruction 2.1 Connection
153 || BACKDOOR DonaldDick 1.53 Traffic
154 || BACKDOOR DeepThroat 3.1 Wrong Password || arachnids,106
155 || BACKDOOR NetSphere 1.31.337 access || arachnids,76
156 || BACKDOOR DeepThroat 3.1 Visible Window List Client Request || arachnids,106
157 || BACKDOOR BackConstruction 2.1 Client FTP Open Request
158 || BACKDOOR BackConstruction 2.1 Server FTP Open Reply
159 || BACKDOOR NetMetro File List || arachnids,79
160 || BACKDOOR NetMetro Incoming Traffic || arachnids,79
161 || BACKDOOR Matrix 2.0 Client connect || arachnids,83
162 || BACKDOOR Matrix 2.0 Server access || arachnids,83
163 || BACKDOOR WinCrash 1.0 Server Active || arachnids,36
164 || BACKDOOR DeepThroat 3.1 Server Active on Network || arachnids,106
165 || BACKDOOR DeepThroat 3.1 Keylogger on Server ON || arachnids,106
166 || BACKDOOR DeepThroat 3.1 Show Picture Client Request || arachnids,106
167 || BACKDOOR DeepThroat 3.1 Hide/Show Clock Client Request || arachnids,106
168 || BACKDOOR DeepThroat 3.1 Hide/Show Desktop Client Request || arachnids,106
169 || BACKDOOR DeepThroat 3.1 Swap Mouse Buttons Client Request || arachnids,106
170 || BACKDOOR DeepThroat 3.1 Enable/Disable CTRL-ALT-DEL Client Request || arachnids,106
171 || BACKDOOR DeepThroat 3.1 Freeze Mouse Client Request || arachnids,106
172 || BACKDOOR DeepThroat 3.1 Show Dialog Box Client Request || arachnids,106
173 || BACKDOOR DeepThroat 3.1 Show Replyable Dialog Box Client Request || arachnids,106
174 || BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request || arachnids,106
175 || BACKDOOR DeepThroat 3.1 Resolution Change Client Request || arachnids,106
176 || BACKDOOR DeepThroat 3.1 Hide/Show Start Button Client Request || arachnids,106
177 || BACKDOOR DeepThroat 3.1 Keylogger on Server OFF || arachnids,106
179 || BACKDOOR DeepThroat 3.1 FTP Server Port Client Request || arachnids,106
180 || BACKDOOR DeepThroat 3.1 Process List Client request || arachnids,106
181 || BACKDOOR DeepThroat 3.1 Close Port Scan Client Request || arachnids,106
182 || BACKDOOR DeepThroat 3.1 Registry Add Client Request || arachnids,106
183 || BACKDOOR SIGNATURE - Q ICMP || arachnids,202
184 || BACKDOOR Q access || arachnids,203
185 || BACKDOOR CDK || arachnids,263
186 || BACKDOOR DeepThroat 3.1 Monitor on/off Client Request || arachnids,106
187 || BACKDOOR DeepThroat 3.1 Delete File Client Request || arachnids,106
188 || BACKDOOR DeepThroat 3.1 Kill Window Client Request || arachnids,106
189 || BACKDOOR DeepThroat 3.1 Disable Window Client Request || arachnids,106
190 || BACKDOOR DeepThroat 3.1 Enable Window Client Request || arachnids,106
191 || BACKDOOR DeepThroat 3.1 Change Window Title Client Request || arachnids,106
192 || BACKDOOR DeepThroat 3.1 Hide Window Client Request || arachnids,106
193 || BACKDOOR DeepThroat 3.1 Show Window Client Request || arachnids,106
194 || BACKDOOR DeepThroat 3.1 Send Text to Window Client Request || arachnids,106
195 || BACKDOOR DeepThroat 3.1 Server Response || arachnids,106
196 || BACKDOOR DeepThroat 3.1 Hide/Show Systray Client Request || arachnids,106
197 || BACKDOOR DeepThroat 3.1 Create Directory Client Request || arachnids,106
198 || BACKDOOR DeepThroat 3.1 All Window List Client Request || arachnids,106
199 || BACKDOOR DeepThroat 3.1 Play Sound Client Request || arachnids,106
200 || BACKDOOR DeepThroat 3.1 Run Program Normal Client Request || arachnids,106
201 || BACKDOOR DeepThroat 3.1 Run Program Hidden Client Request || arachnids,106
202 || BACKDOOR DeepThroat 3.1 Get NET File Client Request || arachnids,106
203 || BACKDOOR DeepThroat 3.1 Find File Client Request || arachnids,106
204 || BACKDOOR DeepThroat 3.1 Find File Client Request || arachnids,106
205 || BACKDOOR DeepThroat 3.1 HUP Modem Client Request || arachnids,106
206 || BACKDOOR DeepThroat 3.1 CD ROM Open Client Request || arachnids,106
207 || BACKDOOR DeepThroat 3.1 CD ROM Close Client Request || arachnids,106
208 || BACKDOOR PhaseZero Server Active on Network
209 || BACKDOOR w00w00 attempt || arachnids,510
210 || BACKDOOR attempt
211 || BACKDOOR MISC r00t attempt
212 || BACKDOOR MISC rewt attempt
213 || BACKDOOR MISC Linux rootkit attempt
214 || BACKDOOR MISC Linux rootkit attempt lrkr0x
215 || BACKDOOR MISC Linux rootkit attempt
216 || BACKDOOR MISC Linux rootkit satori attempt || arachnids,516
217 || BACKDOOR MISC sm4ck attempt
218 || BACKDOOR MISC Solaris 2.5 attempt
219 || BACKDOOR HidePak backdoor attempt
220 || BACKDOOR HideSource backdoor attempt
221 || DDOS TFN Probe || arachnids,443
222 || DDOS tfn2k icmp possible communication || arachnids,425
223 || DDOS Trin00 Daemon to Master PONG message detected || arachnids,187
224 || DDOS Stacheldraht server spoof || arachnids,193
225 || DDOS Stacheldraht gag server response || arachnids,195
226 || DDOS Stacheldraht server response || arachnids,191
227 || DDOS Stacheldraht client spoofworks || arachnids,192
228 || DDOS TFN client command BE || arachnids,184
229 || DDOS Stacheldraht client check skillz || arachnids,190
230 || DDOS shaft client login to handler || url,security.royans.net/info/posts/bugtraq_ddos3.shtml || arachnids,254
231 || DDOS Trin00 Daemon to Master message detected || arachnids,186
232 || DDOS Trin00 Daemon to Master *HELLO* message detected || url,www.sans.org/newlook/resources/IDFAQ/trinoo.htm || arachnids,185
233 || DDOS Trin00 Attacker to Master default startup password || arachnids,197
234 || DDOS Trin00 Attacker to Master default password
235 || DDOS Trin00 Attacker to Master default mdie password
236 || DDOS Stacheldraht client check gag || arachnids,194
237 || DDOS Trin00 Master to Daemon default password attempt || arachnids,197
238 || DDOS TFN server response || arachnids,182
239 || DDOS shaft handler to agent || arachnids,255
240 || DDOS shaft agent to handler || arachnids,256
241 || DDOS shaft synflood || arachnids,253
243 || DDOS mstream agent to handler
244 || DDOS mstream handler to agent || cve,2000-0138
245 || DDOS mstream handler ping to agent || cve,2000-0138
246 || DDOS mstream agent pong to handler
247 || DDOS mstream client to handler || cve,2000-0138
248 || DDOS mstream handler to client || cve,2000-0138
249 || DDOS mstream client to handler || cve,2000-0138 || arachnids,111
250 || DDOS mstream handler to client || cve,2000-0138
251 || DDOS - TFN client command LE || arachnids,183
252 || DNS named iquery attempt || url,www.rfc-editor.org/rfc/rfc1035.txt || cve,1999-0009 || bugtraq,134 || arachnids,277
253 || DNS SPOOF query response PTR with TTL of 1 min. and no authority
254 || DNS SPOOF query response with TTL of 1 min. and no authority
255 || DNS zone transfer TCP || cve,1999-0532 || arachnids,212
256 || DNS named authors attempt || nessus,10728 || arachnids,480
257 || DNS named version attempt || nessus,10028 || arachnids,278
258 || DNS EXPLOIT named 8.2->8.2.1 || cve,1999-0833 || bugtraq,788
259 || DNS EXPLOIT named overflow ADM || cve,1999-0833 || bugtraq,788
260 || DNS EXPLOIT named overflow ADMROCKS || url,www.cert.org/advisories/CA-1999-14.html || cve,1999-0833 || bugtraq,788
261 || DNS EXPLOIT named overflow attempt || url,www.cert.org/advisories/CA-1998-05.html
262 || DNS EXPLOIT x86 Linux overflow attempt
264 || DNS EXPLOIT x86 Linux overflow attempt
265 || DNS EXPLOIT x86 Linux overflow attempt ADMv2
266 || DNS EXPLOIT x86 FreeBSD overflow attempt
267 || DNS EXPLOIT sparc overflow attempt
268 || DOS Jolt attack || cve,1999-0345
269 || DOS Land attack || cve,1999-0016 || bugtraq,2666
270 || DOS Teardrop attack || url,www.cert.org/advisories/CA-1997-28.html || nessus,10279 || cve,1999-0015 || bugtraq,124
271 || DOS UDP echo+chargen bomb || cve,1999-0635 || cve,1999-0103
272 || DOS IGMP dos attack || cve,1999-0918 || bugtraq,514
273 || DOS IGMP dos attack || cve,1999-0918 || bugtraq,514
274 || DOS ath || cve,1999-1228 || arachnids,264
275 || DOS NAPTHA || url,www.microsoft.com/technet/security/bulletin/MS00-091.mspx || url,www.cert.org/advisories/CA-2000-21.html || url,razor.bindview.com/publish/advisories/adv_NAPTHA.html || cve,2000-1039 || bugtraq,2022
276 || DOS Real Audio Server || cve,2000-0474 || bugtraq,1288 || arachnids,411
277 || DOS Real Server template.html || cve,2000-0474 || bugtraq,1288
278 || DOS Real Server template.html || cve,2000-0474 || bugtraq,1288
279 || DOS Bay/Nortel Nautica Marlin || cve,2000-0221 || bugtraq,1009
281 || DOS Ascend Route || cve,1999-0060 || bugtraq,714 || arachnids,262
282 || DOS arkiea backup || cve,1999-0788 || bugtraq,662 || arachnids,261
283 || EXPLOIT Netscape 4.7 client overflow || cve,2000-1187 || cve,1999-1189 || bugtraq,822 || arachnids,215
284 || POP2 x86 Linux overflow
285 || POP2 x86 Linux overflow
286 || POP3 EXPLOIT x86 BSD overflow || cve,1999-0006 || bugtraq,133
287 || POP3 EXPLOIT x86 BSD overflow
288 || POP3 EXPLOIT x86 Linux overflow
289 || POP3 EXPLOIT x86 SCO overflow
290 || POP3 EXPLOIT qpopper overflow || cve,1999-0822 || bugtraq,830
291 || NNTP Cassandra Overflow || cve,2000-0341 || bugtraq,1156 || arachnids,274
292 || EXPLOIT x86 Linux samba overflow || cve,1999-0811 || cve,1999-0182 || bugtraq,536 || bugtraq,1816
293 || IMAP EXPLOIT overflow
295 || IMAP EXPLOIT x86 linux overflow || cve,1999-0005 || bugtraq,130
296 || IMAP EXPLOIT x86 linux overflow || cve,1999-0005 || bugtraq,130
297 || IMAP EXPLOIT x86 linux overflow || cve,1999-0005 || bugtraq,130
298 || IMAP EXPLOIT x86 linux overflow || cve,1999-0005 || bugtraq,130
299 || IMAP EXPLOIT x86 linux overflow || cve, CVE-1999-0005 || bugtraq,130
300 || EXPLOIT nlps x86 Solaris overflow || bugtraq,2319
301 || EXPLOIT LPRng overflow || cve,2000-0917 || bugtraq,1712
302 || EXPLOIT Redhat 7.0 lprd overflow
303 || DNS EXPLOIT named tsig overflow attempt || cve,2001-0010 || bugtraq,2302 || arachnids,482
304 || EXPLOIT SCO calserver overflow || cve,2000-0306 || bugtraq,2353
305 || EXPLOIT delegate proxy overflow || cve,2000-0165 || bugtraq,808 || arachnids,267
306 || EXPLOIT VQServer admin || url,www.vqsoft.com/vq/server/docs/other/control.html || cve,2000-0766 || bugtraq,1610
307 || EXPLOIT CHAT IRC topic overflow || cve,1999-0672 || bugtraq,573
308 || EXPLOIT NextFTP client overflow || cve,1999-0671 || bugtraq,572
309 || EXPLOIT sniffit overflow || cve,2000-0343 || bugtraq,1158 || arachnids,273
310 || EXPLOIT x86 windows MailMax overflow || cve,1999-0404 || bugtraq,2312
311 || EXPLOIT Netscape 4.7 unsucessful overflow || cve,2000-1187 || cve,1999-1189 || bugtraq,822 || arachnids,214
312 || EXPLOIT ntpdx overflow attempt || cve,2001-0414 || bugtraq,2540 || arachnids,492
313 || EXPLOIT ntalkd x86 Linux overflow || bugtraq,210
314 || DNS EXPLOIT named tsig overflow attempt || cve,2001-0010 || bugtraq,2303
315 || EXPLOIT x86 Linux mountd overflow || cve,1999-0002 || bugtraq,121
316 || EXPLOIT x86 Linux mountd overflow || cve,1999-0002 || bugtraq,121
317 || EXPLOIT x86 Linux mountd overflow || cve,1999-0002 || bugtraq,121
318 || EXPLOIT bootp x86 bsd overfow || cve,1999-0914 || bugtraq,324
319 || EXPLOIT bootp x86 linux overflow || cve,1999-0799 || cve,1999-0798 || cve,1999-0389
320 || FINGER cmd_rootsh backdoor attempt || url,www.sans.org/y2k/fingerd.htm || url,www.sans.org/y2k/TFN_toolkit.htm || nessus,10070 || cve,1999-0660
321 || FINGER account enumeration attempt || nessus,10788
322 || FINGER search query || cve,1999-0259 || arachnids,375
323 || FINGER root query || arachnids,376
324 || FINGER null request || arachnids,377
325 || FINGER probe 0 attempt || arachnids,378
326 || FINGER remote command execution attempt || cve,1999-0150 || bugtraq,974 || arachnids,379
327 || FINGER remote command pipe execution attempt || cve,1999-0152 || bugtraq,2220 || arachnids,380
328 || FINGER bomb attempt || cve,1999-0106 || arachnids,381
329 || FINGER cybercop redirection || arachnids,11
330 || FINGER redirection attempt || nessus,10073 || cve,1999-0105 || arachnids,251
331 || FINGER cybercop query || cve,1999-0612 || arachnids,132
332 || FINGER 0 query || nessus,10069 || cve,1999-0197 || arachnids,378 || arachnids,131
333 || FINGER . query || nessus,10072 || cve,1999-0198 || arachnids,130
334 || FTP .forward || arachnids,319
335 || FTP .rhosts || arachnids,328
336 || FTP CWD ~root attempt || cve,1999-0082 || arachnids,318
337 || FTP CEL overflow attempt || cve,1999-0789 || bugtraq,679 || arachnids,257
338 || FTP EXPLOIT format string || cve,2000-0573 || bugtraq,1387 || arachnids,453
339 || FTP EXPLOIT OpenBSD x86 ftpd || cve,2001-0053 || bugtraq,2124 || arachnids,446
340 || FTP EXPLOIT overflow
341 || FTP EXPLOIT overflow
342 || FTP EXPLOIT wu-ftpd 2.6.0 site exec format string overflow Solaris 2.8 || cve,2000-0573 || bugtraq,1387 || arachnids,451
343 || FTP EXPLOIT wu-ftpd 2.6.0 site exec format string overflow FreeBSD || cve,2000-0573 || bugtraq,1387 || arachnids,228
344 || FTP EXPLOIT wu-ftpd 2.6.0 site exec format string overflow Linux || cve,2000-0573 || bugtraq,1387 || arachnids,287
345 || FTP EXPLOIT wu-ftpd 2.6.0 site exec format string overflow generic || nessus,10452 || cve,2000-0573 || bugtraq,1387 || arachnids,285
346 || FTP EXPLOIT wu-ftpd 2.6.0 site exec format string check || cve,2000-0573 || bugtraq,1387 || arachnids,286
348 || FTP EXPLOIT wu-ftpd 2.6.0 || bugtraq,1387 || arachnids,440
349 || FTP EXPLOIT MKD overflow || cve,1999-0368 || bugtraq,2242 || bugtraq,113
350 || FTP EXPLOIT x86 linux overflow || cve,1999-0368 || bugtraq,2242 || bugtraq,113
351 || FTP EXPLOIT x86 linux overflow || cve,1999-0368 || bugtraq,2242 || bugtraq,113
352 || FTP EXPLOIT x86 linux overflow || cve, CVE-1999-0368 || bugtraq, 113
353 || FTP adm scan || arachnids,332
354 || FTP iss scan || arachnids,331
355 || FTP pass wh00t || arachnids,324
356 || FTP passwd retrieval attempt || arachnids,213
357 || FTP piss scan
358 || FTP saint scan || arachnids,330
359 || FTP satan scan || arachnids,329
360 || FTP serv-u directory transversal || cve,2001-0054 || bugtraq,2052
361 || FTP SITE EXEC attempt || cve,1999-0080 || bugtraq,2241 || arachnids,317
362 || FTP tar parameters || cve,1999-0997 || cve,1999-0202 || bugtraq,2240 || arachnids,134
363 || ICMP IRDP router advertisement || cve,1999-0875 || bugtraq,578 || arachnids,173
364 || ICMP IRDP router selection || cve,1999-0875 || bugtraq,578 || arachnids,174
365 || ICMP PING undefined code
366 || ICMP PING *NIX
368 || ICMP PING BSDtype || arachnids,152
369 || ICMP PING BayRS Router || arachnids,444 || arachnids,438
370 || ICMP PING BeOS4.x || arachnids,151
371 || ICMP PING Cisco Type.x || arachnids,153
372 || ICMP PING Delphi-Piette Windows || arachnids,155
373 || ICMP PING Flowpoint2200 or Network Management Software || arachnids,156
374 || ICMP PING IP NetMonitor Macintosh || arachnids,157
375 || ICMP PING LINUX/*BSD || arachnids,447
376 || ICMP PING Microsoft Windows || arachnids,159
377 || ICMP PING Network Toolbox 3 Windows || arachnids,161
378 || ICMP PING Ping-O-MeterWindows || arachnids,164
379 || ICMP PING Pinger Windows || arachnids,163
380 || ICMP PING Seer Windows || arachnids,166
381 || ICMP PING Sun Solaris || arachnids,448
382 || ICMP PING Windows || arachnids,169
384 || ICMP PING
385 || ICMP traceroute || arachnids,118
386 || ICMP Address Mask Reply
387 || ICMP Address Mask Reply undefined code
388 || ICMP Address Mask Request
389 || ICMP Address Mask Request undefined code
390 || ICMP Alternate Host Address
391 || ICMP Alternate Host Address undefined code
392 || ICMP Datagram Conversion Error
393 || ICMP Datagram Conversion Error undefined code
394 || ICMP Destination Unreachable Destination Host Unknown
395 || ICMP Destination Unreachable Destination Network Unknown
396 || ICMP Destination Unreachable Fragmentation Needed and DF bit was set
397 || ICMP Destination Unreachable Host Precedence Violation
398 || ICMP Destination Unreachable Host Unreachable for Type of Service
399 || ICMP Destination Unreachable Host Unreachable
400 || ICMP Destination Unreachable Network Unreachable for Type of Service
401 || ICMP Destination Unreachable Network Unreachable
402 || ICMP Destination Unreachable Port Unreachable
403 || ICMP Destination Unreachable Precedence Cutoff in effect
404 || ICMP Destination Unreachable Protocol Unreachable
405 || ICMP Destination Unreachable Source Host Isolated
406 || ICMP Destination Unreachable Source Route Failed
407 || ICMP Destination Unreachable cndefined code
408 || ICMP Echo Reply
409 || ICMP Echo Reply undefined code
410 || ICMP Fragment Reassembly Time Exceeded
411 || ICMP IPV6 I-Am-Here
412 || ICMP IPV6 I-Am-Here undefined code
413 || ICMP IPV6 Where-Are-You
414 || ICMP IPV6 Where-Are-You undefined code
415 || ICMP Information Reply
416 || ICMP Information Reply undefined code
417 || ICMP Information Request
418 || ICMP Information Request undefined code
419 || ICMP Mobile Host Redirect
420 || ICMP Mobile Host Redirect undefined code
421 || ICMP Mobile Registration Reply
422 || ICMP Mobile Registration Reply undefined code
423 || ICMP Mobile Registration Request
424 || ICMP Mobile Registration Request undefined code
425 || ICMP Parameter Problem Bad Length
426 || ICMP Parameter Problem Missing a Required Option
427 || ICMP Parameter Problem Unspecified Error
428 || ICMP Parameter Problem undefined Code
429 || ICMP Photuris Reserved
430 || ICMP Photuris Unknown Security Parameters Index
431 || ICMP Photuris Valid Security Parameters, But Authentication Failed
432 || ICMP Photuris Valid Security Parameters, But Decryption Failed
433 || ICMP Photuris undefined code!
436 || ICMP Redirect for TOS and Host
437 || ICMP Redirect for TOS and Network
438 || ICMP Redirect undefined code
439 || ICMP Reserved for Security Type 19
440 || ICMP Reserved for Security Type 19 undefined code
441 || ICMP Router Advertisement || arachnids,173
443 || ICMP Router Selection || arachnids,174
445 || ICMP SKIP
446 || ICMP SKIP undefined code
448 || ICMP Source Quench undefined code
449 || ICMP Time-To-Live Exceeded in Transit
450 || ICMP Time-To-Live Exceeded in Transit undefined code
451 || ICMP Timestamp Reply
452 || ICMP Timestamp Reply undefined code
453 || ICMP Timestamp Request
454 || ICMP Timestamp Request undefined code
455 || ICMP Traceroute ipopts || arachnids,238
456 || ICMP Traceroute
457 || ICMP Traceroute undefined code
458 || ICMP unassigned type 1
459 || ICMP unassigned type 1 undefined code
460 || ICMP unassigned type 2
461 || ICMP unassigned type 2 undefined code
462 || ICMP unassigned type 7
463 || ICMP unassigned type 7 undefined code
465 || ICMP ISS Pinger || arachnids,158
466 || ICMP L3retriever Ping || arachnids,311
467 || ICMP Nemesis v1.1 Echo || arachnids,449
469 || ICMP PING NMAP || arachnids,162
471 || ICMP icmpenum v1.1.1 || arachnids,450
472 || ICMP redirect host || cve,1999-0265 || arachnids,135
473 || ICMP redirect net || cve,1999-0265 || arachnids,199
474 || ICMP superscan echo
475 || ICMP traceroute ipopts || arachnids,238
476 || ICMP webtrends scanner || arachnids,307
477 || ICMP Source Quench
478 || ICMP Broadscan Smurf Scanner
480 || ICMP PING speedera
481 || ICMP TJPingPro1.1Build 2 Windows || arachnids,167
482 || ICMP PING WhatsupGold Windows || arachnids,168
483 || ICMP PING CyberKit 2.2 Windows || arachnids,154
484 || ICMP PING Sniffer Pro/NetXRay network scan
485 || ICMP Destination Unreachable Communication Administratively Prohibited
486 || ICMP Destination Unreachable Communication with Destination Host is Administratively Prohibited
487 || ICMP Destination Unreachable Communication with Destination Network is Administratively Prohibited
488 || INFO Connection Closed MSG from Port 80
489 || INFO FTP no password || arachnids,322
490 || INFO battle-mail traffic
491 || INFO FTP Bad login
492 || INFO TELNET Bad Login
493 || INFO psyBNC access
494 || ATTACK-RESPONSES command completed
495 || ATTACK-RESPONSES command error
496 || ATTACK RESPONSES directory listing
497 || ATTACK-RESPONSES file copied ok
498 || ATTACK-RESPONSES id check returned root
499 || ICMP Large ICMP Packet || arachnids,246
500 || MISC source route lssr || cve,1999-0909 || bugtraq,646 || arachnids,418
501 || MISC source route lssre || cve,1999-0909 || bugtraq,646 || arachnids,420
502 || MISC source route ssrr || arachnids,422
503 || MISC Source Port 20 to <1024 || arachnids,06
504 || MISC source port 53 to <1024 || arachnids,07
505 || MISC Insecure TIMBUKTU Password || arachnids,229
506 || MISC ramen worm incoming || arachnids,460
507 || MISC PCAnywhere Attempted Administrator Login
508 || MISC gopher proxy || arachnids,409
509 || WEB-MISC PCCS mysql database admin tool access || arachnids,300
510 || POLICY HP JetDirect LCD modification attempt || bugtraq,2245 || arachnids,302
511 || MISC Invalid PCAnywhere Login
512 || MISC PCAnywhere Failed Login || arachnids,240
513 || MISC Cisco Catalyst Remote Access || cve,1999-0430 || bugtraq,705 || arachnids,129
514 || MISC ramen worm || arachnids,461
516 || MISC SNMP NT UserList
517 || MISC xdmcp query || arachnids,476
518 || TFTP Put || cve,1999-0183 || arachnids,148
519 || TFTP parent directory || cve,2002-1209 || cve,1999-0183 || arachnids,137
520 || TFTP root directory || cve,1999-0183 || arachnids,138
521 || MISC Large UDP Packet || arachnids,247
522 || MISC Tiny Fragments
523 || BAD-TRAFFIC ip reserved bit set
524 || BAD-TRAFFIC tcp port 0 traffic
525 || BAD-TRAFFIC udp port 0 traffic || nessus,10074 || cve,1999-0675 || bugtraq,576
526 || BAD-TRAFFIC data in TCP SYN packet || url,www.cert.org/incident_notes/IN-99-07.html
527 || BAD-TRAFFIC same SRC/DST || url,www.cert.org/advisories/CA-1997-28.html || cve,1999-0016 || bugtraq,2666
528 || BAD-TRAFFIC loopback traffic || url,rr.sans.org/firewall/egress.php
529 || NETBIOS DOS RFPoison || arachnids,454
530 || NETBIOS NT NULL session || cve,2000-0347 || bugtraq,1163 || arachnids,204
532 || NETBIOS SMB ADMIN$ share access
533 || NETBIOS SMB C$ share access
534 || NETBIOS SMB CD.. || arachnids,338
535 || NETBIOS SMB CD... || arachnids,337
536 || NETBIOS SMB D$ share access
537 || NETBIOS SMB IPC$ share access
538 || NETBIOS SMB IPC$ share unicode access
539 || NETBIOS Samba clientaccess || arachnids,341
540 || CHAT MSN message
541 || CHAT ICQ access
542 || CHAT IRC nick change
543 || POLICY FTP 'STOR 1MB' possible warez site
544 || POLICY FTP 'RETR 1MB' possible warez site
545 || POLICY FTP 'CWD / ' possible warez site
546 || POLICY FTP 'CWD ' possible warez site
547 || POLICY FTP 'MKD ' possible warez site
548 || POLICY FTP 'MKD .' possible warez site
549 || P2P napster login
550 || P2P napster new user login
551 || P2P napster download attempt
552 || P2P napster upload request
553 || POLICY FTP anonymous login attempt
554 || POLICY FTP 'MKD / ' possible warez site
555 || POLICY WinGate telnet server response || cve,1999-0657 || arachnids,366
556 || P2P Outbound GNUTella client request
557 || P2P GNUTella client request
558 || INFO Outbound GNUTella client request
559 || P2P Inbound GNUTella client request
560 || POLICY VNC server response
561 || P2P Napster Client Data
562 || P2P Napster Client Data
563 || P2P Napster Client Data
564 || P2P Napster Client Data
565 || P2P Napster Server Login
566 || POLICY PCAnywhere server response || arachnids,239
567 || POLICY SMTP relaying denied || url,mail-abuse.org/tsi/ar-fix.html || arachnids,249
568 || POLICY HP JetDirect LCD modification attempt || bugtraq,2245 || arachnids,302
569 || RPC snmpXdmi overflow attempt TCP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0236 || bugtraq,2417
570 || RPC EXPLOIT ttdbserv solaris overflow || url,www.cert.org/advisories/CA-2001-27.html || cve,1999-0003 || bugtraq,122 || arachnids,242
571 || RPC EXPLOIT ttdbserv Solaris overflow || url,www.cert.org/advisories/CA-2001-27.html || cve,1999-0003 || bugtraq,122 || arachnids,242
572 || RPC DOS ttdbserv Solaris || cve,1999-0003 || bugtraq,122 || arachnids,241
573 || RPC AMD Overflow || cve,1999-0704 || arachnids,217
574 || RPC mountd TCP export request || arachnids,26
575 || RPC portmap admind request UDP || arachnids,18
576 || RPC portmap amountd request UDP || arachnids,19
577 || RPC portmap bootparam request UDP || cve,1999-0647 || arachnids,16
578 || RPC portmap cmsd request UDP || arachnids,17
579 || RPC portmap mountd request UDP || arachnids,13
580 || RPC portmap nisd request UDP || arachnids,21
581 || RPC portmap pcnfsd request UDP || arachnids,22
582 || RPC portmap rexd request UDP || arachnids,23
583 || RPC portmap rstatd request UDP || arachnids,10
584 || RPC portmap rusers request UDP || cve,1999-0626 || arachnids,133
585 || RPC portmap sadmind request UDP || arachnids,20
586 || RPC portmap selection_svc request UDP || arachnids,25
587 || RPC portmap status request UDP || arachnids,15
588 || RPC portmap ttdbserv request UDP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0717 || cve,1999-1075 || cve,1999-0687 || cve,1999-0003 || bugtraq,3382 || bugtraq,122 || arachnids,24
589 || RPC portmap yppasswd request UDP || arachnids,14
590 || RPC portmap ypserv request UDP || cve,2002-1232 || cve,2000-1043 || cve,2000-1042 || bugtraq,6016 || bugtraq,5914 || arachnids,12
591 || RPC portmap ypupdated request TCP || arachnids,125
592 || RPC rstatd query || arachnids,9
593 || RPC portmap snmpXdmi request TCP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0236 || bugtraq,2417
595 || RPC portmap espd request TCP || cve,2001-0331 || bugtraq,2714
596 || RPC portmap listing || arachnids,429
597 || RPC portmap listing || arachnids,429
598 || RPC portmap listing TCP 111 || arachnids,428
599 || RPC portmap listing TCP 32771 || arachnids,429
600 || RPC EXPLOIT statdx || arachnids,442
601 || RSERVICES rlogin LinuxNIS
602 || RSERVICES rlogin bin || arachnids,384
603 || RSERVICES rlogin echo++ || arachnids,385
604 || RSERVICES rsh froot || arachnids,387
605 || RSERVICES rlogin login failure || arachnids,393
606 || RSERVICES rlogin root || arachnids,389
607 || RSERVICES rsh bin || arachnids,390
608 || RSERVICES rsh echo + + || arachnids,388
609 || RSERVICES rsh froot || arachnids,387
610 || RSERVICES rsh root || arachnids,391
611 || RSERVICES rlogin login failure || arachnids,392
612 || RPC rusers query UDP || cve,1999-0626
613 || SCAN myscan || arachnids,439
614 || BACKDOOR hack-a-tack attempt || arachnids,314
615 || SCAN SOCKS Proxy attempt || url,help.undernet.org/proxyscan/
616 || SCAN ident version request || arachnids,303
617 || SCAN ssh-research-scanner
618 || SCAN Squid Proxy attempt
619 || SCAN cybercop os probe || arachnids,146
620 || SCAN Proxy Port 8080 attempt
621 || SCAN FIN || arachnids,27
622 || SCAN ipEye SYN scan || arachnids,236
623 || SCAN NULL || arachnids,4
624 || SCAN SYN FIN || arachnids,198
625 || SCAN XMAS || arachnids,144
626 || SCAN cybercop os PA12 attempt || arachnids,149
627 || SCAN cybercop os SFU12 probe || arachnids,150
628 || SCAN nmap TCP || arachnids,28
629 || SCAN nmap fingerprint attempt || arachnids,05
630 || SCAN synscan portscan || arachnids,441
631 || SMTP ehlo cybercop attempt || arachnids,372
632 || SMTP expn cybercop attempt || arachnids,371
634 || SCAN Amanda client version request
635 || SCAN XTACACS logout || arachnids,408
636 || SCAN cybercop udp bomb || arachnids,363
637 || SCAN Webtrends Scanner UDP Probe || arachnids,308
638 || SHELLCODE SGI NOOP || arachnids,356
639 || SHELLCODE SGI NOOP || arachnids,357
640 || SHELLCODE AIX NOOP
641 || SHELLCODE Digital UNIX NOOP || arachnids,352
642 || SHELLCODE HP-UX NOOP || arachnids,358
643 || SHELLCODE HP-UX NOOP || arachnids,359
644 || SHELLCODE sparc NOOP || arachnids,345
645 || SHELLCODE sparc NOOP || arachnids,353
646 || SHELLCODE sparc NOOP || arachnids,355
647 || SHELLCODE sparc setuid 0 || arachnids,282
648 || SHELLCODE x86 NOOP || arachnids,181
649 || SHELLCODE x86 setgid 0 || arachnids,284
650 || SHELLCODE x86 setuid 0 || arachnids,436
651 || SHELLCODE x86 stealth NOOP || arachnids,291
652 || SHELLCODE Linux shellcode || arachnids,343
653 || SHELLCODE x86 unicode NOOP
654 || SMTP RCPT TO overflow || cve,2001-0260 || bugtraq,9696 || bugtraq,2283
655 || SMTP sendmail 8.6.9 exploit || cve,1999-0204 || bugtraq,2311 || arachnids,140
656 || SMTP EXPLOIT x86 windows CSMMail overflow || cve,2000-0042 || bugtraq,895
657 || SMTP chameleon overflow || cve,1999-0261 || bugtraq,2387 || arachnids,266
658 || SMTP exchange mime DOS
659 || SMTP expn decode || arachnids,32
660 || SMTP expn root || arachnids,31
661 || SMTP majordomo ifs || cve,1999-0208 || arachnids,143
662 || SMTP sendmail 5.5.5 exploit || arachnids,119
663 || SMTP rcpt to command attempt || cve,1999-0095 || bugtraq,1 || arachnids,172
664 || SMTP RCPT TO decode attempt || cve,1999-0203 || bugtraq,2308 || arachnids,121
665 || SMTP sendmail 5.6.5 exploit || arachnids,122
666 || SMTP sendmail 8.4.1 exploit || arachnids,120
667 || SMTP sendmail 8.6.10 exploit || arachnids,123
668 || SMTP sendmail 8.6.10 exploit || arachnids,124
669 || SMTP sendmail 8.6.9 exploit || cve,1999-0204 || bugtraq,2311 || arachnids,142
670 || SMTP sendmail 8.6.9 exploit || cve,1999-0204 || bugtraq,2311 || arachnids,139
671 || SMTP sendmail 8.6.9c exploit || cve,1999-0204 || bugtraq,2311 || arachnids,141
672 || SMTP vrfy decode || arachnids,373
673 || MS-SQL sp_start_job - program execution
674 || MS-SQL xp_displayparamstmt possible buffer overflow || cve,2000-1081 || bugtraq,2030
675 || MS-SQL xp_setsqlsecurity possible buffer overflow || bugtraq,2043
676 || MS-SQL/SMB sp_start_job - program execution
677 || MS-SQL/SMB sp_password password change
678 || MS-SQL/SMB sp_delete_alert log file deletion
679 || MS-SQL/SMB sp_adduser database user creation
680 || MS-SQL/SMB sa login failed
681 || MS-SQL/SMB xp_cmdshell program execution
682 || MS-SQL xp_enumresultset possible buffer overflow
683 || MS-SQL sp_password - password change
684 || MS-SQL sp_delete_alert log file deletion
685 || MS-SQL sp_adduser - database user creation
686 || MS-SQL xp_reg* - registry access
687 || MS-SQL xp_cmdshell - program execution
688 || MS-SQL sa login failed
689 || MS-SQL/SMB xp_reg* registry access
690 || MS-SQL/SMB xp_printstatements possible buffer overflow || cve,2000-1086 || bugtraq,2041
691 || MS-SQL shellcode attempt
692 || MS-SQL/SMB shellcode attempt
693 || MS-SQL shellcode attempt
694 || MS-SQL/SMB shellcode attempt
695 || MS-SQL/SMB xp_sprintf possible buffer overflow || bugtraq,1204
696 || MS-SQL/SMB xp_showcolv possible buffer overflow || bugtraq,2038
697 || MS-SQL/SMB xp_peekqueue possible buffer overflow || cve,2000-1085 || bugtraq,2040
698 || MS-SQL/SMB xp_proxiedmetadata possible buffer overflow || cve,2000-1087 || bugtraq,2042
699 || MS-SQL xp_printstatements possible buffer overflow || cve,2000-1086 || bugtraq,2041
700 || MS-SQL/SMB xp_updatecolvbm possible buffer overflow || cve,2000-1084 || bugtraq,2039
701 || MS-SQL xp_updatecolvbm possible buffer overflow || cve,2000-1084 || bugtraq,2039
702 || MS-SQL/SMB xp_displayparamstmt possible buffer overflow || cve,2000-1081 || bugtraq,2030
703 || MS-SQL/SMB xp_setsqlsecurity possible buffer overflow || bugtraq,2043
704 || MS-SQL xp_sprintf possible buffer overflow || bugtraq,1204
705 || MS-SQL xp_showcolv possible buffer overflow || cve,2000-1083 || bugtraq,2038
706 || MS-SQL xp_peekqueue possible buffer overflow || cve,2000-1085 || bugtraq,2040
707 || MS-SQL xp_proxiedmetadata possible buffer overflow || cve,2000-1087 || cve,1999-0287 || bugtraq,2024
708 || MS-SQL/SMB xp_enumresultset possible buffer overflow || cve,2000-1082 || bugtraq,2031
709 || TELNET 4Dgifts SGI account attempt || cve,1999-0501
710 || TELNET EZsetup account attempt || cve,1999-0501
711 || TELNET SGI telnetd format bug || arachnids,304
712 || TELNET ld_library_path || cve,1999-0073 || bugtraq,459 || arachnids,367
713 || TELNET livingston DOS || arachnids,370
714 || TELNET resolv_host_conf || arachnids,369
715 || TELNET Attempted SU from wrong group
716 || TELNET access || cve,1999-0619 || arachnids,08
717 || TELNET not on console || arachnids,365
718 || TELNET login incorrect || arachnids,127
719 || TELNET root login
720 || Virus - SnowWhite Trojan Incoming
721 || VIRUS OUTBOUND bad file attachment
722 || Virus - Possible NAVIDAD Worm
723 || Virus - Possible MyRomeo Worm
724 || Virus - Possible MyRomeo Worm
725 || Virus - Possible MyRomeo Worm
726 || Virus - Possible MyRomeo Worm
727 || Virus - Possible MyRomeo Worm
728 || Virus - Possible MyRomeo Worm
729 || VIRUS OUTBOUND .scr file attachment
730 || VIRUS OUTBOUND .shs file attachment
731 || Virus - Possible QAZ Worm || MCAFEE,98775
732 || Virus - Possible QAZ Worm Infection || MCAFEE,98775
733 || Virus - Possible QAZ Worm Calling Home || MCAFEE,98775
734 || Virus - Possible Matrix worm
735 || Virus - Possible MyRomeo Worm
736 || Virus - Successful eurocalculator execution
737 || Virus - Possible eurocalculator.exe file
738 || Virus - Possible Pikachu Pokemon Virus || MCAFEE,98696
739 || Virus - Possible Triplesix Worm || MCAFEE,10389
740 || Virus - Possible Tune.vbs || MCAFEE,10497
741 || Virus - Possible NAIL Worm || MCAFEE,10109
742 || Virus - Possible NAIL Worm || MCAFEE,10109
743 || Virus - Possible NAIL Worm || MCAFEE,10109
744 || Virus - Possible NAIL Worm || MCAFEE,10109
745 || Virus - Possible Papa Worm || MCAFEE,10145
746 || Virus - Possible Freelink Worm || MCAFEE,10225
747 || Virus - Possible Simbiosis Worm
748 || Virus - Possible BADASS Worm || MCAFEE,10388
749 || Virus - Possible ExploreZip.B Worm || MCAFEE,10471
751 || Virus - Possible wscript.KakWorm || MCAFEE,10509
752 || Virus Possible Suppl Worm || MCAFEE,10361
753 || Virus - Possible NewApt.Worm - theobbq.exe || MCAFEE,10540
754 || Virus - Possible Word Macro - VALE || MCAFEE,10502
755 || Virus - Possible IROK Worm || MCAFEE,98552
756 || Virus - Possible Fix2001 Worm || MCAFEE,10355
757 || Virus - Possible Y2K Zelu Trojan || MCAFEE,10505
758 || Virus - Possible The_Fly Trojan || MCAFEE,10478
759 || Virus - Possible Word Macro - VALE || MCAFEE,10502
760 || Virus - Possible Passion Worm || MCAFEE,10467
761 || Virus - Possible NewApt.Worm - cooler3.exe || MCAFEE,10540
762 || Virus - Possible NewApt.Worm - party.exe || MCAFEE,10540
763 || Virus - Possible NewApt.Worm - hog.exe || MCAFEE,10540
764 || Virus - Possible NewApt.Worm - goal1.exe || MCAFEE,10540
765 || Virus - Possible NewApt.Worm - pirate.exe || MCAFEE,10540
766 || Virus - Possible NewApt.Worm - video.exe || MCAFEE,10540
767 || Virus - Possible NewApt.Worm - baby.exe || MCAFEE,10540
768 || Virus - Possible NewApt.Worm - cooler1.exe || MCAFEE,10540
769 || Virus - Possible NewApt.Worm - boss.exe || MCAFEE,10540
770 || Virus - Possible NewApt.Worm - g-zilla.exe || MCAFEE,10540
771 || Virus - Possible ToadieE-mail Trojan || MCAFEE,10540
772 || Virus - Possible PrettyPark Trojan || MCAFEE,10175
773 || Virus - Possible Happy99 Virus || MCAFEE,10144
774 || Virus - Possible CheckThis Trojan
775 || Virus - Possible Bubbleboy Worm || MCAFEE,10418
776 || Virus - Possible NewApt.Worm - copier.exe || MCAFEE,10540
777 || Virus - Possible MyPics Worm || MCAFEE,10467
778 || Virus - Possible Babylonia - X-MAS.exe || MCAFEE,10461
779 || Virus - Possible NewApt.Worm - gadget.exe || MCAFEE,10540
780 || Virus - Possible NewApt.Worm - irnglant.exe || MCAFEE,10540
781 || Virus - Possible NewApt.Worm - casper.exe || MCAFEE,10540
782 || Virus - Possible NewApt.Worm - fborfw.exe || MCAFEE,10540
783 || Virus - Possible NewApt.Worm - saddam.exe || MCAFEE,10540
784 || Virus - Possible NewApt.Worm - bboy.exe || MCAFEE,10540
785 || Virus - Possible NewApt.Worm - monica.exe || MCAFEE,10540
786 || Virus - Possible NewApt.Worm - goal.exe || MCAFEE,10540
787 || Virus - Possible NewApt.Worm - panther.exe || MCAFEE,10540
788 || Virus - Possible NewApt.Worm - chestburst.exe || MCAFEE,10540
789 || Virus - Possible NewApt.Worm - farter.exe || MCAFEE,1054
790 || Virus - Possible Common Sense Worm
791 || Virus - Possible NewApt.Worm - cupid2.exe || MCAFEE,10540
792 || Virus - Possible Resume Worm || MCAFEE,98661
793 || VIRUS OUTBOUND .vbs file attachment
794 || Virus - Possible Resume Worm || MCAFEE,98661
795 || Virus - Possible Worm - txt.vbs file
796 || Virus - Possible Worm - xls.vbs file
797 || Virus - Possible Worm - jpg.vbs file
798 || Virus - Possible Worm - gif.vbs file
799 || Virus - Possible Timofonica Worm || MCAFEE,98674
800 || Virus - Possible Resume Worm || MCAFEE,98661
801 || Virus - Possible Worm - doc.vbs file
802 || Virus - Possbile Zipped Files Trojan || MCAFEE,10450
803 || WEB-CGI HyperSeek hsx.cgi directory traversal attempt || cve,2001-0253 || bugtraq,2314
804 || WEB-CGI SWSoft ASPSeek Overflow attempt || cve,2001-0476 || bugtraq,2492
805 || WEB-CGI webspeed access || nessus,10304 || cve,2000-0127 || bugtraq,969 || arachnids,467
806 || WEB-CGI yabb directory traversal attempt || cve,2000-0853 || bugtraq,1668 || arachnids,462
807 || WEB-CGI /wwwboard/passwd.txt access || nessus,10321 || cve,1999-0954 || cve,1999-0953 || bugtraq,649 || arachnids,463
808 || WEB-CGI webdriver access || nessus,10592 || bugtraq,2166 || arachnids,473
809 || WEB-CGI whois_raw.cgi arbitrary command execution attempt || nessus,10306 || cve,1999-1063 || bugtraq,304 || arachnids,466
810 || WEB-CGI whois_raw.cgi access || nessus,10306 || cve,1999-1063 || bugtraq,304 || arachnids,466
811 || WEB-CGI websitepro path access || cve,2000-0066 || bugtraq,932 || arachnids,468
812 || WEB-CGI webplus version access || cve,2000-0282 || bugtraq,1102 || arachnids,470
813 || WEB-CGI webplus directory traversal || cve,2000-0282 || bugtraq,1102 || arachnids,471
815 || WEB-CGI websendmail access || nessus,10301 || cve,1999-0196 || bugtraq,2077 || arachnids,469
817 || WEB-CGI dcboard.cgi invalid user addition attempt || nessus,10583 || cve,2001-0527 || bugtraq,2728
818 || WEB-CGI dcforum.cgi access || nessus,10583 || cve,2001-0527 || bugtraq,2728
819 || WEB-CGI mmstdod.cgi access || cve,2001-0021
820 || WEB-CGI anaconda directory transversal attempt || cve,2001-0308 || cve,2000-0975 || bugtraq,2388 || bugtraq,2338
821 || WEB-CGI imagemap.exe overflow attempt || nessus,10122 || cve,1999-0951 || bugtraq,739 || arachnids,412
823 || WEB-CGI cvsweb.cgi access || cve,2000-0670 || bugtraq,1469
824 || WEB-CGI php.cgi access || cve,1999-0238 || bugtraq,2250 || arachnids,232
825 || WEB-CGI glimpse access || bugtraq,2026
826 || WEB-CGI htmlscript access || cve,1999-0264 || bugtraq,2001
827 || WEB-CGI info2www access || cve,1999-0266 || bugtraq,1995
828 || WEB-CGI maillist.pl access
829 || WEB-CGI nph-test-cgi access || nessus,10165 || cve,1999-0045 || bugtraq,686 || arachnids,224
830 || WEB-CGI NPH-publish access || cve,1999-1177
832 || WEB-CGI perl.exe access || url,www.cert.org/advisories/CA-1996-11.html || nessus,10173 || cve,1999-0509 || arachnids,219
833 || WEB-CGI rguest.exe access || cve,1999-0467 || cve,1999-0287 || bugtraq,2024
834 || WEB-CGI rwwwshell.pl access || url,www.itsecurity.com/papers/p37.htm
835 || WEB-CGI test-cgi access || nessus,10282 || cve,1999-0070 || bugtraq,2003 || arachnids,218
836 || WEB-CGI textcounter.pl access || cve,1999-1479
837 || WEB-CGI uploader.exe access || nessus,10291 || cve,1999-0177
838 || WEB-CGI webgais access || nessus,10300 || cve,1999-0176 || bugtraq,2058 || arachnids,472
839 || WEB-CGI finger access || nessus,10071 || cve,1999-0612 || arachnids,221
840 || WEB-CGI perlshop.cgi access || cve,1999-1374
841 || WEB-CGI pfdisplay.cgi access || cve,1999-0270 || bugtraq,64
842 || WEB-CGI aglimpse access || nessus,10095 || cve,1999-0147 || bugtraq,2026
843 || WEB-CGI anform2 access || cve,1999-0066 || arachnids,225
844 || WEB-CGI args.bat access || cve,1999-1374
845 || WEB-CGI AT-admin.cgi access || cve,1999-1072
846 || WEB-CGI bnbform.cgi access || cve,1999-0937 || bugtraq,2147
847 || WEB-CGI campas access || cve,1999-0146 || bugtraq,1975
848 || WEB-CGI view-source directory traversal || cve,1999-0174 || bugtraq,8883 || bugtraq,2251
849 || WEB-CGI view-source access || cve,1999-0174 || bugtraq,8883 || bugtraq,2251
850 || WEB-CGI wais.pl access
851 || WEB-CGI files.pl access || cve,1999-1081
852 || WEB-CGI wguest.exe access || cve,1999-0467 || cve,1999-0287 || bugtraq,2024
853 || WEB-CGI wrap access || nessus,10317 || cve,1999-0149 || bugtraq,373 || arachnids,234
854 || WEB-CGI classifieds.cgi access || cve,1999-0934 || bugtraq,2020
855 || WEB-CGI edit.pl access || bugtraq,2713
856 || WEB-CGI environ.cgi access
857 || WEB-CGI faxsurvey access || nessus,10067 || cve,1999-0262 || bugtraq,2056
858 || WEB-CGI filemail access || cve,1999-1154
859 || WEB-CGI man.sh access || cve,1999-1179
860 || WEB-CGI snork.bat access || cve,2000-0169 || bugtraq,1053 || arachnids,220
861 || WEB-CGI w3-msql access || nessus,10296 || cve,2000-0012 || cve,1999-0753 || cve,1999-0276 || bugtraq,898 || bugtraq,591 || arachnids,210
862 || WEB-CGI csh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
863 || WEB-CGI day5datacopier.cgi access || cve,1999-1232
864 || WEB-CGI day5datanotifier.cgi access || cve,1999-1232
865 || WEB-CGI ksh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
866 || WEB-CGI post-query access || cve,2001-0291 || bugtraq,6752
867 || WEB-CGI visadmin.exe access || nessus,10295 || cve,1999-1970 || cve,1999-0970 || bugtraq,1808
868 || WEB-CGI rsh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
869 || WEB-CGI dumpenv.pl access || nessus,10060 || cve,1999-1178
870 || WEB-CGI snorkerz.cmd access
871 || WEB-CGI survey.cgi access || cve,1999-0936 || bugtraq,1817
872 || WEB-CGI tcsh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
873 || WEB-CGI scriptalias access || cve,1999-0236 || bugtraq,2300 || arachnids,227
874 || WEB-CGI w3-msql solaris x86 access || cve,1999-0276 || arachnids,211
875 || WEB-CGI win-c-sample.exe access || nessus,10008 || cve,1999-0178 || bugtraq,2078 || arachnids,231
877 || WEB-CGI rksh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
878 || WEB-CGI w3tvars.pm access
879 || WEB-CGI admin.pl access || url,online.securityfocus.com/archive/1/249355 || bugtraq,3839
880 || WEB-CGI LWGate access || url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm || url,www.netspace.org/~dwb/lwgate/lwgate-history.html
881 || WEB-CGI archie access
882 || WEB-CGI calendar access
883 || WEB-CGI flexform access || url,www.wiretrip.net/rfp/p/doc.asp/i2/d6.htm
884 || WEB-CGI formmail access || nessus,10782 || nessus,10076 || cve,2000-0411 || cve,1999-0172 || bugtraq,2079 || bugtraq,1187 || arachnids,226
885 || WEB-CGI bash access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
886 || WEB-CGI phf access || cve,1999-0067 || bugtraq,629 || arachnids,128
887 || WEB-CGI www-sql access || url,marc.theaimsgroup.com/?l=bugtraq&m=88704258804054&w=2
888 || WEB-CGI wwwadmin.pl access
889 || WEB-CGI ppdscgi.exe access || url,online.securityfocus.com/archive/1/16878 || bugtraq,491
890 || WEB-CGI sendform.cgi access || url,www.scn.org/help/sendform.txt || cve,2002-0710 || bugtraq,5286
891 || WEB-CGI upload.pl access
892 || WEB-CGI AnyForm2 access || cve,1999-0066 || bugtraq,719
893 || WEB-CGI MachineInfo access || cve,1999-1067
894 || WEB-CGI bb-hist.sh access || nessus,10025 || cve,1999-1462 || bugtraq,142
895 || WEB-CGI redirect access || cve,2000-0382 || bugtraq,1179
896 || WEB-CGI way-board access || nessus,10610 || cve,2001-0214 || bugtraq,2370
897 || WEB-CGI pals-cgi access || nessus,10611 || cve,2001-0217 || cve,2001-0216 || bugtraq,2372
898 || WEB-CGI commerce.cgi access || nessus,10612 || cve,2001-0210 || bugtraq,2361
899 || WEB-CGI Amaya templates sendtemp.pl directory traversal attempt || cve,2001-0272 || bugtraq,2504
900 || WEB-CGI webspirs.cgi directory traversal attempt || nessus,10616 || cve,2001-0211 || bugtraq,2362
901 || WEB-CGI webspirs.cgi access || nessus,10616 || cve,2001-0211 || bugtraq,2362
902 || WEB-CGI tstisapi.dll access || cve,2001-0302
903 || WEB-COLDFUSION cfcache.map access || cve,2000-0057 || bugtraq,917
904 || WEB-COLDFUSION exampleapp application.cfm || cve,2000-0189 || bugtraq,1021
905 || WEB-COLDFUSION application.cfm access || cve,2000-0189 || bugtraq,1021
906 || WEB-COLDFUSION getfile.cfm access || cve,1999-0800 || bugtraq,229
907 || WEB-COLDFUSION addcontent.cfm access
908 || WEB-COLDFUSION administrator access || cve,2000-0538 || bugtraq,1314
909 || WEB-COLDFUSION datasource username attempt || bugtraq,550
910 || WEB-COLDFUSION fileexists.cfm access || bugtraq,550
911 || WEB-COLDFUSION exprcalc access || cve,1999-0455 || bugtraq,550 || bugtraq,115
912 || WEB-COLDFUSION parks access || bugtraq,550
913 || WEB-COLDFUSION cfappman access || bugtraq,550
914 || WEB-COLDFUSION beaninfo access || bugtraq,550
915 || WEB-COLDFUSION evaluate.cfm access || bugtraq,550
916 || WEB-COLDFUSION getodbcdsn access || bugtraq,550
917 || WEB-COLDFUSION db connections flush attempt || bugtraq,550
918 || WEB-COLDFUSION expeval access || cve,1999-0477 || bugtraq,550
919 || WEB-COLDFUSION datasource passwordattempt || bugtraq,550
920 || WEB-COLDFUSION datasource attempt || bugtraq,550
921 || WEB-COLDFUSION admin encrypt attempt || bugtraq,550
922 || WEB-COLDFUSION displayfile access || bugtraq,550
923 || WEB-COLDFUSION getodbcin attempt || bugtraq,550
924 || WEB-COLDFUSION admin decrypt attempt || bugtraq,550
925 || WEB-COLDFUSION mainframeset access || bugtraq,550
926 || WEB-COLDFUSION set odbc ini attempt || bugtraq,550
927 || WEB-COLDFUSION settings refresh attempt || bugtraq,550
928 || WEB-COLDFUSION exampleapp access
929 || WEB-COLDFUSION CFUSION_VERIFYMAIL access || bugtraq,550
930 || WEB-COLDFUSION snippets attempt || bugtraq,550
931 || WEB-COLDFUSION cfmlsyntaxcheck.cfm access || bugtraq,550
932 || WEB-COLDFUSION application.cfm access || cve,2000-0189 || bugtraq,550 || arachnids,268
933 || WEB-COLDFUSION onrequestend.cfm access || cve,2000-0189 || bugtraq,550 || arachnids,269
935 || WEB-COLDFUSION startstop DOS access || bugtraq,247
936 || WEB-COLDFUSION gettempdirectory.cfm access || bugtraq,550
937 || WEB-FRONTPAGE _vti_rpc access || bugtraq,2144
939 || WEB-FRONTPAGE posting
940 || WEB-FRONTPAGE shtml.dll access || arachnids,292
941 || WEB-FRONTPAGE contents.htm access
942 || WEB-FRONTPAGE orders.htm access
943 || WEB-FRONTPAGE fpsrvadm.exe access
944 || WEB-FRONTPAGE fpremadm.exe access
945 || WEB-FRONTPAGE fpadmin.htm access
946 || WEB-FRONTPAGE fpadmcgi.exe access
947 || WEB-FRONTPAGE orders.txt access
948 || WEB-FRONTPAGE form_results access
949 || WEB-FRONTPAGE registrations.htm access
950 || WEB-FRONTPAGE cfgwiz.exe access
951 || WEB-FRONTPAGE authors.pwd access || nessus,10078 || cve,1999-0386 || bugtraq,989
952 || WEB-FRONTPAGE author.exe access
953 || WEB-FRONTPAGE administrators.pwd access || bugtraq,1205
954 || WEB-FRONTPAGE form_results.htm access
955 || WEB-FRONTPAGE access.cnf access
956 || WEB-FRONTPAGE register.txt access
957 || WEB-FRONTPAGE registrations.txt access
958 || WEB-FRONTPAGE service.cnf access
959 || WEB-FRONTPAGE service.pwd || bugtraq,1205
960 || WEB-FRONTPAGE service.stp access
961 || WEB-FRONTPAGE services.cnf access
962 || WEB-FRONTPAGE shtml.exe access || nessus,10405 || cve,2000-0709 || cve,2000-0413 || bugtraq,1608 || bugtraq,1174
963 || WEB-FRONTPAGE svcacl.cnf access
964 || WEB-FRONTPAGE users.pwd access
965 || WEB-FRONTPAGE writeto.cnf access
966 || WEB-FRONTPAGE .... request || cve,2000-0153 || cve,1999-0386 || bugtraq,989 || arachnids,248
967 || WEB-FRONTPAGE dvwssr.dll access || url,www.microsoft.com/technet/security/bulletin/ms00-025.mspx || cve,2000-0260 || bugtraq,1109 || bugtraq,1108 || arachnids,271
968 || WEB-FRONTPAGE register.htm access
969 || WEB-IIS WebDAV file lock attempt || bugtraq,2736
970 || WEB-IIS multiple decode attempt || cve,2001-0333 || bugtraq,2708
971 || WEB-IIS ISAPI .printer access || cve,2001-0241 || bugtraq,2674 || arachnids,533
972 || WEB-IIS %2E-asp access || cve,1999-0253 || bugtraq,1814
973 || WEB-IIS *.idc attempt || cve,2000-0661 || cve,1999-0874 || bugtraq,1448
974 || WEB-IIS Directory transversal attempt || cve,1999-0229 || bugtraq,2218
975 || WEB-IIS Alternate Data streams ASP file access attempt || url,support.microsoft.com/default.aspx?scid=kb\ || nessus,10362 || cve,1999-0278 || bugtraq,149
976 || WEB-IIS .bat? access || url,support.microsoft.com/support/kb/articles/Q155/0/56.asp || url,support.microsoft.com/support/kb/articles/Q148/1/88.asp || cve,1999-0233 || bugtraq,2023
977 || WEB-IIS .cnf access
978 || WEB-IIS ASP contents view || nessus,10356 || cve,2000-0302 || bugtraq,1084
979 || WEB-IIS ASP contents view || cve,2000-0942 || bugtraq,1861
980 || WEB-IIS CGImail.exe access || cve,2000-0726 || bugtraq,1623
981 || WEB-IIS unicode directory traversal attempt || cve,2000-0884 || bugtraq,1806
982 || WEB-IIS unicode directory traversal attempt || cve,2000-0884 || bugtraq,1806
983 || WEB-IIS unicode directory traversal attempt || cve,2000-0884 || bugtraq,1806
984 || WEB-IIS JET VBA access || cve,1999-0874 || bugtraq,307
985 || WEB-IIS JET VBA access || cve,1999-0874 || bugtraq,286
986 || WEB-IIS MSProxy access
987 || WEB-IIS .htr access || cve,2000-0630 || bugtraq,1488
988 || WEB-IIS SAM Attempt || url,www.ciac.org/ciac/bulletins/h-45.shtml
989 || WEB-IIS Unicode2.pl script File permission canonicalization
990 || WEB-IIS _vti_inf access
991 || WEB-IIS achg.htr access || cve,1999-0407 || bugtraq,2110
992 || WEB-IIS adctest.asp access
993 || WEB-IIS iisadmin access
994 || WEB-IIS /scripts/iisadmin/default.htm access
995 || WEB-IIS ism.dll access || cve,2000-0630 || cve,1999-1538 || bugtraq,189
996 || WEB-IIS anot.htr access || cve,1999-0407 || bugtraq,2110
997 || WEB-IIS asp-dot attempt
998 || WEB-IIS asp-srch attempt
999 || WEB-IIS bdir access
1000 || WEB-IIS bdir.htr access
1001 || WEB-MISC carbo.dll access || cve,1999-1069 || bugtraq,2126
1002 || WEB-IIS cmd.exe access
1003 || WEB-IIS cmd? access
1004 || WEB-IIS codebrowser Exair access || cve,1999-0815 || cve,1999-0499
1005 || WEB-IIS codebrowser SDK access || cve,1999-0736 || bugtraq,167
1007 || WEB-IIS cross-site scripting attempt
1008 || WEB-IIS del attempt
1009 || WEB-IIS directory listing
1010 || WEB-IIS encoding access || arachnids,200
1011 || WEB-IIS exec-src access
1012 || WEB-IIS fpcount attempt || cve,1999-1376 || bugtraq,2252
1013 || WEB-IIS fpcount access || cve,1999-1376 || bugtraq,2252
1015 || WEB-IIS getdrvs.exe access
1016 || WEB-IIS global.asa access || nessus,10491 || cve,2000-0778
1017 || WEB-IIS idc-srch attempt || cve,1999-0874
1018 || WEB-IIS iisadmpwd attempt || cve,2000-0304 || bugtraq,2110 || bugtraq,1191
1019 || WEB-IIS index server file source code attempt
1020 || WEB-IIS isc$data attempt || cve,1999-0874 || bugtraq,307
1021 || WEB-IIS ism.dll attempt || cve,2000-0457 || bugtraq,1193
1022 || WEB-IIS jet vba access || cve,1999-0874 || bugtraq,286
1023 || WEB-IIS msadcs.dll access || cve,1999-1011 || bugtraq,529
1024 || WEB-IIS newdsn.exe access || nessus,10360 || cve,1999-0191 || bugtraq,1818
1025 || WEB-IIS perl access
1026 || WEB-IIS perl-browse newline attempt || bugtraq,6833
1027 || WEB-IIS perl-browse space attempt || bugtraq,6833
1028 || WEB-IIS query.asp access || cve,1999-0449 || bugtraq,193
1029 || WEB-IIS scripts-browse access
1030 || WEB-IIS search97.vts access || bugtraq,162
1031 || WEB-IIS /SiteServer/Publishing/viewcode.asp access || nessus,10576
1032 || WEB-IIS showcode access || nessus,10576
1033 || WEB-IIS showcode access || nessus,10576
1034 || WEB-IIS showcode access || nessus,10576
1035 || WEB-IIS showcode access || nessus,10576
1036 || WEB-IIS showcode access || nessus,10576
1037 || WEB-IIS showcode.asp access || nessus,10007 || cve,1999-0736 || bugtraq,167
1038 || WEB-IIS site server config access || cve,1999-1520 || bugtraq,256
1039 || WEB-IIS srch.htm access
1040 || WEB-IIS srchadm access
1041 || WEB-IIS uploadn.asp access
1042 || WEB-IIS view source via translate header || bugtraq,1578 || arachnids,305
1043 || WEB-IIS viewcode.asp access || nessus,10576
1044 || WEB-IIS webhits access || arachnids,237
1045 || WEB-IIS Unauthorized IP Access Attempt
1046 || WEB-IIS site/iisamples access
1047 || WEB-MISC Netscape Enterprise DOS || cve,2001-0251 || bugtraq,2294
1048 || WEB-MISC Netscape Enterprise directory listing attempt || cve,2001-0250 || bugtraq,2285
1049 || WEB-MISC iPlanet ../../ DOS attempt || cve,2001-0252 || bugtraq,2282
1050 || WEB-MISC iPlanet GETPROPERTIES attempt
1051 || WEB-CGI technote main.cgi file directory traversal attempt || cve,2001-0075 || bugtraq,2156
1052 || WEB-CGI technote print.cgi directory traversal attempt || cve,2001-0075 || bugtraq,2156
1053 || WEB-CGI ads.cgi command execution attempt || cve,2001-0025 || bugtraq,2103
1054 || WEB-MISC weblogic/tomcat .jsp view source attempt || bugtraq,2527
1055 || WEB-MISC Tomcat directory traversal attempt || bugtraq,2518
1056 || WEB-MISC Tomcat view source attempt || bugtraq,2527
1057 || WEB-MISC ftp attempt
1058 || WEB-MISC xp_enumdsn attempt
1059 || WEB-MISC xp_filelist attempt
1060 || WEB-MISC xp_availablemedia attempt
1061 || WEB-MISC xp_cmdshell attempt
1062 || WEB-MISC nc.exe attempt
1064 || WEB-MISC wsh attempt
1065 || WEB-MISC rcmd attempt
1066 || WEB-MISC telnet attempt
1067 || WEB-MISC net attempt
1068 || WEB-MISC tftp attempt
1069 || WEB-MISC xp_regread attempt
1070 || WEB-MISC WebDAV search access || arachnids,474
1071 || WEB-MISC .htpasswd access
1072 || WEB-MISC Lotus Domino directory traversal || cve,2001-0009 || bugtraq,2173
1073 || WEB-MISC webhits.exe access
1075 || WEB-IIS postinfo.asp access
1076 || WEB-IIS repost.asp access || nessus,10372
1077 || WEB-MISC queryhit.htm access
1078 || WEB-MISC counter.exe access || cve,1999-1030 || bugtraq,267
1079 || WEB-MISC WebDAV propfind access || cve,2000-0869 || bugtraq,1656
1080 || WEB-MISC unify eWave ServletExec upload || cve,2000-1025 || cve,2000-1024 || bugtraq,1876 || bugtraq,1868
1081 || WEB-MISC Netscape Servers suite DOS || cve,2000-1025 || bugtraq,1868
1082 || WEB-MISC amazon 1-click cookie theft || cve,2000-0439 || bugtraq,1194
1083 || WEB-MISC unify eWave ServletExec DOS
1084 || WEB-MISC Allaire JRUN DOS attempt || bugtraq,2337
1085 || WEB-PHP strings overflow || bugtraq,802 || arachnids,431
1086 || WEB-PHP strings overflow || cve,2000-0967 || bugtraq,1786 || arachnids,430
1087 || WEB-MISC whisker tab splice attack || url,www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html || arachnids,415
1088 || WEB-CGI eXtropia webstore directory traversal || cve,2000-1005 || bugtraq,1774
1089 || WEB-CGI shopping cart directory traversal || cve,2000-0921 || bugtraq,1777
1090 || WEB-CGI Allaire Pro Web Shell attempt
1091 || WEB-MISC ICQ Webfront HTTP DOS
1092 || WEB-CGI Armada Style Master Index directory traversal
1093 || WEB-CGI cached_feed.cgi moreover shopping cart directory traversal || cve,2000-0906 || bugtraq,1762
1094 || WEB-CGI webstore directory traversal || cve,2000-1005 || bugtraq,1774
1095 || WEB-MISC Talentsoft Web+ Source Code view access || bugtraq,1722
1096 || WEB-MISC Talentsoft Web+ internal IP Address access || bugtraq,1720
1097 || WEB-CGI Talentsoft Web+ exploit attempt || bugtraq,1725
1098 || WEB-MISC SmartWin CyberOffice Shopping Cart access || cve,2000-0925 || bugtraq,1734
1099 || WEB-MISC cybercop scan || arachnids,374
1100 || WEB-MISC L3retriever HTTP Probe || arachnids,310
1101 || WEB-MISC Webtrends HTTP probe || arachnids,309
1102 || WEB-MISC Nessus 404 probe || arachnids,301
1103 || WEB-MISC Netscape admin passwd || bugtraq,1579
1104 || WEB-MISC whisker space splice attack || url,www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html || arachnids,296
1105 || WEB-MISC BigBrother access
1106 || WEB-CGI Poll-it access || cve,2000-0590 || bugtraq,1431
1107 || WEB-MISC ftp.pl access || nessus,10467 || cve,2000-0674 || bugtraq,1471
1108 || WEB-MISC Tomcat server snoop access || cve,2000-0760 || bugtraq,1532
1109 || WEB-MISC ROXEN directory list attempt || cve,2000-0671 || bugtraq,1510
1110 || WEB-MISC apache source.asp file access || cve,2000-0628 || bugtraq,1457
1111 || WEB-MISC Tomcat server exploit access
1112 || WEB-MISC http directory traversal || arachnids,298
1113 || WEB-MISC http directory traversal || arachnids,297
1114 || WEB-MISC prefix-get //
1115 || WEB-MISC ICQ webserver DOS || cve,1999-0474
1116 || WEB-MISC Lotus DelDoc attempt
1117 || WEB-MISC Lotus EditDoc attempt || url,www.securiteam.com/exploits/5NP080A1RE.html
1118 || WEB-MISC ls%20-l
1119 || WEB-MISC mlog.phtml access || cve,1999-0346 || cve,1999-0068 || bugtraq,713
1120 || WEB-MISC mylog.phtml access || cve,1999-0346 || cve,1999-0068 || bugtraq,713
1121 || WEB-MISC O'Reilly args.bat access
1122 || WEB-MISC /etc/passwd
1123 || WEB-MISC ?PageServices access || cve,1999-0269 || bugtraq,7621 || bugtraq,1063
1124 || WEB-MISC Ecommerce check.txt access
1125 || WEB-MISC webcart access || nessus,10298 || cve,1999-0610
1126 || WEB-MISC AuthChangeUrl access
1127 || WEB-MISC convert.bas access || cve,1999-0175 || bugtraq,2025
1128 || WEB-MISC cpshost.dll access
1129 || WEB-MISC .htaccess access
1130 || WEB-MISC .wwwacl access
1131 || WEB-MISC .wwwacl access
1132 || WEB-MISC Netscape Unixware overflow || arachnids,180
1133 || SCAN cybercop os probe || arachnids,145
1134 || WEB-PHP Phorum admin access || bugtraq,2271 || arachnids,205
1136 || WEB-MISC cd..
1137 || WEB-PHP Phorum authentication access || bugtraq,2274 || arachnids,206
1138 || WEB-MISC Cisco Web DOS attempt || arachnids,275
1139 || WEB-MISC whisker HEAD/./ || url,www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html
1140 || WEB-MISC guestbook.pl access || nessus,10099 || cve,1999-1053 || cve,1999-0237 || bugtraq,776 || arachnids,228
1141 || WEB-MISC handler access || nessus,10100 || cve,1999-0148 || bugtraq,380 || arachnids,235
1142 || WEB-MISC /.... access
1143 || WEB-MISC ///cgi-bin access
1144 || WEB-MISC /cgi-bin/// access
1145 || WEB-MISC /~root access
1146 || WEB-MISC Ecommerce import.txt access
1147 || WEB-MISC cat%20 access || cve,1999-0039 || bugtraq,374
1148 || WEB-MISC Ecommerce import.txt access
1149 || WEB-CGI count.cgi access || nessus,10049 || cve,1999-0021 || bugtraq,128
1150 || WEB-MISC Domino catalog.nsf access
1151 || WEB-MISC Domino domcfg.nsf access
1152 || WEB-MISC Domino domlog.nsf access
1153 || WEB-MISC Domino log.nsf access
1154 || WEB-MISC Domino names.nsf access
1155 || WEB-MISC Ecommerce checks.txt access
1156 || WEB-MISC apache DOS attempt
1157 || WEB-MISC Netscape PublishingXpert access || cve,2000-1196
1158 || WEB-MISC windmail.exe access || nessus,10365 || cve,2000-0242 || bugtraq,1073 || arachnids,465
1159 || WEB-MISC webplus access || cve,2000-1005 || bugtraq,1725 || bugtraq,1722 || bugtraq,1720 || bugtraq,1174
1160 || WEB-MISC Netscape dir index wp || cve,2000-0236 || bugtraq,1063 || arachnids,270
1161 || WEB-PHP piranha passwd.php3 access || cve,2000-0322 || bugtraq,1149 || arachnids,272
1162 || WEB-MISC cart 32 AdminPwd access || cve,2000-0429 || bugtraq,1153
1163 || WEB-CGI webdist.cgi access || nessus,10299 || cve,1999-0039 || bugtraq,374
1164 || WEB-MISC shopping cart access || cve,2000-1188 || cve,1999-0607 || bugtraq,2049 || bugtraq,1983
1165 || WEB-MISC Novell Groupwise gwweb.exe access || nessus,10877 || cve,1999-1006 || cve,1999-1005 || bugtraq,879
1166 || WEB-MISC ws_ftp.ini access || cve,1999-1078 || bugtraq,547
1167 || WEB-MISC rpm_query access || cve,2000-0192 || bugtraq,1036
1168 || WEB-MISC mall log order access
1171 || WEB-MISC whisker HEAD with large datagram || url,www.wiretrip.net/rfp/pages/whitepapers/whiskerids.html
1172 || WEB-CGI bigconf.cgi access || nessus,10027 || cve,1999-1550 || bugtraq,778
1173 || WEB-MISC architext_query.pl access
1174 || WEB-CGI /cgi-bin/jj access || cve,1999-0260 || bugtraq,2002
1175 || WEB-MISC wwwboard.pl access || cve,1999-0954 || cve,1999-0930 || bugtraq,649 || bugtraq,1795
1176 || WEB-MISC order.log access
1177 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1178 || WEB-PHP Phorum read access || arachnids,208
1179 || WEB-PHP Phorum violation access || bugtraq,2272 || arachnids,209
1180 || WEB-MISC get32.exe access || nessus,10013 || cve,1999-0885 || bugtraq,770 || bugtraq,1485 || arachnids,258
1181 || WEB-MISC Annex Terminal DOS attempt || cve,1999-1070 || arachnids,260
1182 || WEB-MISC cgitest.exe attempt || nessus,10623 || nessus,10040 || cve,2002-0128 || cve,2000-0521 || bugtraq,3885 || bugtraq,1313 || arachnids,265
1183 || WEB-MISC Netscape Enterprise Server directory view || cve,2000-0236 || bugtraq,1063
1184 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1185 || WEB-CGI bizdbsearch attempt || cve,2000-0287 || bugtraq,1104
1186 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1187 || WEB-MISC SalesLogix Eviewer web command attempt || cve,2000-0289 || cve,2000-0278 || bugtraq,1089 || bugtraq,1078
1188 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1189 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1190 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1191 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1192 || WEB-MISC Trend Micro OfficeScan access || bugtraq,1057
1193 || WEB-MISC oracle web arbitrary command execution attempt || nessus,10348 || cve,2000-0169 || bugtraq,1053
1194 || WEB-CGI sojourn.cgi File attempt || cve,2000-0180 || bugtraq,1052
1195 || WEB-CGI sojourn.cgi access || cve,2000-0180 || bugtraq,1052
1196 || WEB-CGI SGI InfoSearch fname attempt || cve,2000-0207 || bugtraq,1031 || arachnids,290
1197 || WEB-PHP Phorum code access || arachnids,207
1198 || WEB-MISC Netscape Enterprise Server directory view || bugtraq,1063
1199 || WEB-MISC Compaq Insight directory traversal || cve,1999-0771 || bugtraq,282 || arachnids,244
1200 || ATTACK-RESPONSES Invalid URL || url,www.microsoft.com/technet/security/bulletin/MS00-063.mspx
1201 || ATTACK-RESPONSES 403 Forbidden
1202 || WEB-MISC search.vts access
1204 || WEB-CGI ax-admin.cgi access
1205 || WEB-CGI axs.cgi access
1206 || WEB-CGI cachemgr.cgi access || nessus,10034 || cve,1999-0710 || bugtraq,2059
1207 || WEB-MISC htgrep access || cve,2000-0832
1208 || WEB-CGI responder.cgi access
1209 || WEB-MISC .nsconfig access
1211 || WEB-CGI web-map.cgi access
1212 || WEB-MISC Admin_files access
1213 || WEB-MISC backup access
1214 || WEB-MISC intranet access
1215 || WEB-CGI ministats admin access
1216 || WEB-MISC filemail access
1217 || WEB-MISC plusmail access || cve,2000-0074 || bugtraq,2653
1218 || WEB-MISC adminlogin access
1219 || WEB-CGI dfire.cgi access || cve,1999-0913 || bugtraq,564 || bugtraq,0564
1220 || WEB-MISC ultraboard access
1221 || WEB-MISC musicat empower access
1222 || WEB-CGI pals-cgi arbitrary file access attempt || nessus,10611 || cve,2001-0217 || bugtraq,2372
1224 || WEB-MISC ROADS search.pl attempt || nessus,10627 || cve,2001-0215 || bugtraq,2371
1225 || X11 MIT Magic Cookie detected || arachnids,396
1226 || X11 xopen || arachnids,395
1227 || X11 outbound client connection detected || arachnids,126
1228 || SCAN nmap XMAS || arachnids,30
1229 || FTP CWD ... || bugtraq,9237
1230 || WEB-MISC VirusWall FtpSave access || nessus,10733 || cve,2001-0432 || bugtraq,2808
1231 || WEB-MISC VirusWall catinfo access || nessus,10650 || cve,2001-0432 || bugtraq,2808 || bugtraq,2579
1232 || WEB-MISC VirusWall catinfo access || nessus,10650 || cve,2001-0432 || bugtraq,2808 || bugtraq,2579
1233 || WEB-CLIENT Outlook EML access
1234 || WEB-MISC VirusWall FtpSaveCSP access || nessus,10733 || cve,2001-0432 || bugtraq,2808
1235 || WEB-MISC VirusWall FtpSaveCVP access || nessus,10733 || cve,2001-0432 || bugtraq,2808
1236 || WEB-MISC Tomcat sourecode view
1237 || WEB-MISC Tomcat sourecode view
1238 || WEB-MISC Tomcat sourecode view
1239 || NETBIOS RFParalyze Attempt
1240 || EXPLOIT MDBMS overflow || cve,2000-0446 || bugtraq,1252
1241 || WEB-MISC SWEditServlet directory traversal attempt
1242 || WEB-IIS ISAPI .ida access || cve,2000-0071 || bugtraq,1065 || arachnids,552
1243 || WEB-IIS ISAPI .ida attempt || cve,2000-0071 || bugtraq,1065 || arachnids,552
1244 || WEB-IIS ISAPI .idq attempt || cve,2000-0071 || bugtraq,1065 || arachnids,553
1245 || WEB-IIS ISAPI .idq access || cve,2000-0071 || bugtraq,1065 || arachnids,553
1246 || WEB-FRONTPAGE rad overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS01-035.mspx || cve,2001-0341 || bugtraq,2906 || arachnids,555
1247 || WEB-FRONTPAGE rad overflow attempt || cve,2001-0341 || bugtraq,2906
1248 || WEB-FRONTPAGE rad fp30reg.dll access || url,www.microsoft.com/technet/security/bulletin/MS01-035.mspx || cve,2001-0341 || bugtraq,2906 || arachnids,555
1249 || WEB-FRONTPAGE frontpage rad fp4areg.dll access || cve,2001-0341 || bugtraq,2906
1250 || WEB-MISC Cisco IOS HTTP configuration attempt || cve,2001-0537 || bugtraq,2936
1251 || INFO TELNET Bad Login
1252 || TELNET bsd telnet exploit response || cve,2001-0554 || bugtraq,3064
1253 || TELNET bsd exploit client finishing || cve,2001-0554 || bugtraq,3064
1254 || WEB-PHP PHPLIB remote command attempt || cve,2001-1370 || bugtraq,3079
1255 || WEB-PHP PHPLIB remote command attempt || cve,2001-1370 || bugtraq,3079
1256 || WEB-IIS CodeRed v2 root.exe access || url,www.cert.org/advisories/CA-2001-19.html
1257 || DOS Winnuke attack || cve,1999-0153 || bugtraq,2010
1258 || WEB-MISC HP OpenView Manager DOS || cve,2001-0552 || bugtraq,2845
1259 || WEB-MISC SWEditServlet access
1260 || WEB-MISC long basic authorization string || cve,2001-1067 || bugtraq,3230
1261 || EXPLOIT AIX pdnsd overflow || cve,1999-0745 || bugtraq,590 || bugtraq,3237
1262 || RPC portmap admind request TCP || arachnids,18
1263 || RPC portmap amountd request TCP || arachnids,19
1264 || RPC portmap bootparam request TCP || cve,1999-0647 || arachnids,16
1265 || RPC portmap cmsd request TCP || arachnids,17
1266 || RPC portmap mountd request TCP || arachnids,13
1267 || RPC portmap nisd request TCP || arachnids,21
1268 || RPC portmap pcnfsd request TCP || arachnids,22
1269 || RPC portmap rexd request TCP || arachnids,23
1270 || RPC portmap rstatd request TCP || arachnids,10
1271 || RPC portmap rusers request TCP || cve,1999-0626 || arachnids,133
1272 || RPC portmap sadmind request TCP || arachnids,20
1273 || RPC portmap selection_svc request TCP || arachnids,25
1274 || RPC portmap ttdbserv request TCP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0717 || cve,1999-1075 || cve,1999-0687 || cve,1999-0003 || bugtraq,3382 || bugtraq,122 || arachnids,24
1275 || RPC portmap yppasswd request TCP || arachnids,14
1276 || RPC portmap ypserv request TCP || cve,2002-1232 || cve,2000-1043 || cve,2000-1042 || bugtraq,6016 || bugtraq,5914 || arachnids,12
1277 || RPC portmap ypupdated request UDP || arachnids,125
1278 || RPC rstatd query || arachnids,9
1279 || RPC portmap snmpXdmi request UDP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0236 || bugtraq,2417
1280 || RPC portmap listing UDP 111 || arachnids,428
1281 || RPC portmap listing UDP 32771 || arachnids,429
1282 || RPC EXPLOIT statdx || arachnids,442
1283 || WEB-IIS outlook web dos || bugtraq,3223
1284 || WEB-CLIENT readme.eml download attempt || url,www.cert.org/advisories/CA-2001-26.html
1285 || WEB-IIS msdac access
1286 || WEB-IIS _mem_bin access
1287 || WEB-IIS scripts access
1288 || WEB-FRONTPAGE /_vti_bin/ access
1289 || TFTP GET Admin.dll || url,www.cert.org/advisories/CA-2001-26.html
1290 || WEB-CLIENT readme.eml autoload attempt || url,www.cert.org/advisories/CA-2001-26.html
1291 || WEB-MISC sml3com access || cve,2001-0740 || bugtraq,2721
1292 || ATTACK-RESPONSES directory listing
1293 || NETBIOS nimda .eml || url,www.f-secure.com/v-descs/nimda.shtml
1294 || NETBIOS nimda .nws || url,www.f-secure.com/v-descs/nimda.shtml
1295 || NETBIOS nimda RICHED20.DLL || url,www.f-secure.com/v-descs/nimda.shtml
1296 || RPC portmap request yppasswdd || bugtraq,2763
1297 || RPC portmap request yppasswdd || bugtraq,2763
1298 || RPC portmap tooltalk request TCP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0717 || cve,1999-1075 || cve,1999-0687 || cve,1999-0003 || bugtraq,3382
1299 || RPC portmap tooltalk request UDP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0717 || cve,1999-1075 || cve,1999-0687 || cve,1999-0003 || bugtraq,3382
1300 || WEB-PHP admin.php file upload attempt || cve,2001-1032 || bugtraq,3361
1301 || WEB-PHP admin.php access || cve,2001-1032 || bugtraq,9270 || bugtraq,7532 || bugtraq,3361
1302 || WEB-MISC console.exe access || cve,2001-1252 || bugtraq,3375
1303 || WEB-MISC cs.exe access || cve,2001-1252 || bugtraq,3375
1304 || WEB-CGI txt2html.cgi access
1305 || WEB-CGI txt2html.cgi directory traversal attempt
1306 || WEB-CGI store.cgi product directory traversal attempt || cve,2001-0305 || bugtraq,2385
1307 || WEB-CGI store.cgi access || nessus,10639 || cve,2001-0305 || bugtraq,2385
1308 || WEB-CGI sendmessage.cgi access
1309 || WEB-CGI zsh access || url,www.cert.org/advisories/CA-1996-11.html || cve,1999-0509
1310 || PORN free XXX
1311 || PORN hardcore anal
1312 || PORN nude cheerleader
1313 || PORN up skirt
1314 || PORN young teen
1315 || PORN hot young sex
1316 || PORN fuck fuck fuck
1317 || PORN anal sex
1318 || PORN hardcore rape
1319 || PORN real snuff
1320 || PORN fuck movies
1321 || BAD-TRAFFIC 0 ttl || url,www.isi.edu/in-notes/rfc1122.txt || url,support.microsoft.com/default.aspx?scid=kb\
1322 || BAD-TRAFFIC bad frag bits
1323 || EXPLOIT rwhoisd format string attempt || cve,2001-0838 || bugtraq,3474
1324 || EXPLOIT ssh CRC32 overflow /bin/sh || cve,2001-0572 || cve,2001-0144 || bugtraq,2347
1325 || EXPLOIT ssh CRC32 overflow filler || cve,2001-0572 || cve,2001-0144 || bugtraq,2347
1326 || EXPLOIT ssh CRC32 overflow NOOP || cve,2001-0572 || cve,2001-0144 || bugtraq,2347
1327 || EXPLOIT ssh CRC32 overflow || cve,2001-0572 || cve,2001-0144 || bugtraq,2347
1328 || WEB-ATTACKS ps command attempt
1329 || WEB-ATTACKS /bin/ps command attempt
1330 || WEB-ATTACKS wget command attempt
1331 || WEB-ATTACKS uname -a command attempt
1332 || WEB-ATTACKS /usr/bin/id command attempt
1333 || WEB-ATTACKS id command attempt
1334 || WEB-ATTACKS echo command attempt
1335 || WEB-ATTACKS kill command attempt
1336 || WEB-ATTACKS chmod command attempt
1337 || WEB-ATTACKS chgrp command attempt
1338 || WEB-ATTACKS chown command attempt
1339 || WEB-ATTACKS chsh command attempt
1340 || WEB-ATTACKS tftp command attempt
1341 || WEB-ATTACKS /usr/bin/gcc command attempt
1342 || WEB-ATTACKS gcc command attempt
1343 || WEB-ATTACKS /usr/bin/cc command attempt
1344 || WEB-ATTACKS cc command attempt
1345 || WEB-ATTACKS /usr/bin/cpp command attempt
1346 || WEB-ATTACKS cpp command attempt
1347 || WEB-ATTACKS /usr/bin/g++ command attempt
1348 || WEB-ATTACKS g++ command attempt
1349 || WEB-ATTACKS bin/python access attempt
1350 || WEB-ATTACKS python access attempt
1351 || WEB-ATTACKS bin/tclsh execution attempt
1352 || WEB-ATTACKS tclsh execution attempt
1353 || WEB-ATTACKS bin/nasm command attempt
1354 || WEB-ATTACKS nasm command attempt
1355 || WEB-ATTACKS /usr/bin/perl execution attempt
1356 || WEB-ATTACKS perl execution attempt
1357 || WEB-ATTACKS nt admin addition attempt
1358 || WEB-ATTACKS traceroute command attempt
1359 || WEB-ATTACKS ping command attempt
1360 || WEB-ATTACKS netcat command attempt
1361 || WEB-ATTACKS nmap command attempt
1362 || WEB-ATTACKS xterm command attempt
1363 || WEB-ATTACKS X application to remote host attempt
1364 || WEB-ATTACKS lsof command attempt
1365 || WEB-ATTACKS rm command attempt
1366 || WEB-ATTACKS mail command attempt
1367 || WEB-ATTACKS mail command attempt
1368 || WEB-ATTACKS /bin/ls| command attempt
1369 || WEB-ATTACKS /bin/ls command attempt
1370 || WEB-ATTACKS /etc/inetd.conf access
1371 || WEB-ATTACKS /etc/motd access
1372 || WEB-ATTACKS /etc/shadow access
1373 || WEB-ATTACKS conf/httpd.conf attempt
1374 || WEB-ATTACKS .htgroup access
1375 || WEB-MISC sadmind worm access || url,www.cert.org/advisories/CA-2001-11.html
1376 || WEB-MISC jrun directory browse attempt || bugtraq,3592
1377 || FTP wu-ftp bad file completion attempt [ || cve,2001-0886 || cve,2001-0550 || bugtraq,3707 || bugtraq,3581
1378 || FTP wu-ftp bad file completion attempt { || cve,2001-0886 || cve,2001-0550 || bugtraq,3707 || bugtraq,3581
1379 || FTP STAT overflow attempt || url,labs.defcom.com/adv/2001/def-2001-31.txt
1380 || WEB-IIS cross-site scripting attempt
1381 || WEB-MISC Trend Micro OfficeScan attempt || bugtraq,1057
1382 || EXPLOIT CHAT IRC Ettercap parse overflow attempt || url,www.bugtraq.org/dev/GOBBLES-12.txt
1383 || P2P Fastrack kazaa/morpheus GET request || url,www.musiccity.com/technology.htm || url,www.kazaa.com
1384 || MISC UPnP malformed advertisement || url,www.microsoft.com/technet/security/bulletin/MS01-059.mspx || cve,2001-0877 || cve,2001-0876 || bugtraq,3723
1385 || WEB-MISC mod-plsql administration access || nessus,10849 || cve,2001-1217 || cve,2001-1216 || bugtraq,3727 || bugtraq,3726
1386 || MS-SQL/SMB raiserror possible buffer overflow || cve,2001-0542 || bugtraq,3733
1387 || MS-SQL raiserror possible buffer overflow || cve,2001-0542 || bugtraq,3733
1388 || MISC UPnP Location overflow || cve,2001-0876 || bugtraq,3723
1389 || WEB-MISC viewcode.jse access || bugtraq,3715
1390 || SHELLCODE x86 inc ebx NOOP
1391 || WEB-MISC Phorecast remote code execution attempt || cve,2001-1049 || bugtraq,3388
1392 || WEB-CGI lastlines.cgi access || cve,2001-1206 || cve,2001-1205 || bugtraq,3755 || bugtraq,3754
1393 || MISC AIM AddGame attempt || url,www.w00w00.org/files/w00aimexp/ || cve,2002-0005 || bugtraq,3769
1394 || SHELLCODE x86 NOOP
1395 || WEB-CGI zml.cgi attempt || cve,2001-1209 || bugtraq,3759
1396 || WEB-CGI zml.cgi access || cve,2001-1209 || bugtraq,3759
1397 || WEB-CGI wayboard attempt || cve,2001-0214 || bugtraq,2370
1398 || EXPLOIT CDE dtspcd exploit attempt || url,www.cert.org/advisories/CA-2002-01.html || cve,2001-0803 || bugtraq,3517
1399 || WEB-PHP PHP-Nuke remote file include attempt || cve,2002-0206 || bugtraq,3889
1400 || WEB-IIS /scripts/samples/ access
1401 || WEB-IIS /msadc/samples/ access
1402 || WEB-IIS iissamples access
1403 || WEB-MISC viewcode access
1404 || WEB-MISC showcode access
1405 || WEB-CGI AHG search.cgi access || bugtraq,3985
1406 || WEB-CGI agora.cgi access || nessus,10836 || cve,2002-0215 || cve,2001-1199 || bugtraq,3976 || bugtraq,3702
1407 || WEB-PHP smssend.php access || cve,2002-0220 || bugtraq,3982
1408 || DOS MSDTC attempt || cve,2002-0224 || bugtraq,4006
1409 || SNMP community string buffer overflow attempt || url,www.cert.org/advisories/CA-2002-03.html || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1410 || WEB-CGI dcboard.cgi access || nessus,10583 || cve,2001-0527 || bugtraq,2728
1411 || SNMP public access udp || cve,2002-0013 || cve,2002-0012 || cve,1999-0517 || bugtraq,4089 || bugtraq,4088 || bugtraq,2112
1412 || SNMP public access tcp || cve,2002-0013 || cve,2002-0012 || cve,1999-0517 || bugtraq,7212 || bugtraq,4089 || bugtraq,4088 || bugtraq,2112
1413 || SNMP private access udp || cve,2002-0013 || cve,2002-0012 || bugtraq,7212 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1414 || SNMP private access tcp || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1415 || SNMP Broadcast request || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1416 || SNMP broadcast trap || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1417 || SNMP request udp || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1418 || SNMP request tcp || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1419 || SNMP trap udp || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1420 || SNMP trap tcp || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1421 || SNMP AgentX/tcp request || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1422 || SNMP community string buffer overflow attempt with evasion || url,www.cert.org/advisories/CA-2002-03.html || cve,2002-0013 || cve,2002-0012 || bugtraq,4132 || bugtraq,4089 || bugtraq,4088
1423 || WEB-PHP content-disposition memchr overflow || cve,2002-0081 || bugtraq,4183
1424 || SHELLCODE x86 0xEB0C NOOP
1425 || WEB-PHP content-disposition || cve,2002-0081 || bugtraq,4183
1426 || SNMP PROTOS test-suite-req-app attempt || url,www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html
1427 || SNMP PROTOS test-suite-trap-app attempt || url,www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.html
1428 || MULTIMEDIA audio galaxy keepalive
1429 || POLICY poll.gotomypc.com access || url,www.gotomypc.com/help2.tmpl
1430 || TELNET Solaris memory mismanagement exploit attempt
1431 || BAD-TRAFFIC syn to multicast address
1432 || P2P GNUTella client request
1433 || WEB-MISC .history access
1434 || WEB-MISC .bash_history access
1435 || DNS named authors attempt || nessus,10728 || arachnids,480
1436 || MULTIMEDIA Quicktime User Agent access
1437 || MULTIMEDIA Windows Media audio download
1438 || MULTIMEDIA Windows Media Video download
1439 || MULTIMEDIA Shoutcast playlist redirection
1440 || MULTIMEDIA Icecast playlist redirection
1441 || TFTP GET nc.exe
1442 || TFTP GET shadow
1443 || TFTP GET passwd
1444 || TFTP Get
1445 || POLICY FTP file_id.diz access possible warez site
1446 || SMTP vrfy root
1447 || MISC MS Terminal server request RDP || cve,2001-0540 || bugtraq,3099
1448 || MISC MS Terminal server request || cve,2001-0540 || bugtraq,3099
1449 || POLICY FTP anonymous ftp login attempt
1450 || SMTP expn *@ || cve,1999-1200
1451 || WEB-CGI NPH-publish access || cve,2001-0400 || bugtraq,2563
1452 || WEB-CGI args.cmd access || cve,1999-1374
1453 || WEB-CGI AT-generated.cgi access || cve,1999-1072
1454 || WEB-CGI wwwwais access || nessus,10597 || cve,2001-0223
1455 || WEB-CGI calender.pl access || cve,2000-0432
1456 || WEB-CGI calender_admin.pl access || cve,2000-0432
1457 || WEB-CGI user_update_admin.pl access || cve,2000-0627 || bugtraq,1486
1458 || WEB-CGI user_update_passwd.pl access || cve,2000-0627 || bugtraq,1486
1459 || WEB-CGI bb-histlog.sh access || cve,1999-1462 || bugtraq,142
1460 || WEB-CGI bb-histsvc.sh access || cve,1999-1462 || bugtraq,142
1461 || WEB-CGI bb-rep.sh access || cve,1999-1462 || bugtraq,142
1462 || WEB-CGI bb-replog.sh access || cve,1999-1462 || bugtraq,142
1463 || CHAT IRC message
1464 || ATTACK-RESPONSES oracle one hour install
1465 || WEB-CGI auktion.cgi access || nessus,10638 || cve,2001-0212 || bugtraq,2367
1466 || WEB-CGI cgiforum.pl access || nessus,10552 || cve,2000-1171 || bugtraq,1963
1467 || WEB-CGI directorypro.cgi access || cve,2001-0780 || bugtraq,2793
1468 || WEB-CGI Web Shopper shopper.cgi attempt || cve,2000-0922 || bugtraq,1776
1469 || WEB-CGI Web Shopper shopper.cgi access || cve,2000-0922 || bugtraq,1776
1470 || WEB-CGI listrec.pl access || cve,2001-0997
1471 || WEB-CGI mailnews.cgi access || cve,2001-0271
1472 || WEB-CGI book.cgi access || nessus,10721 || cve,2001-1114 || bugtraq,3178
1473 || WEB-CGI newsdesk.cgi access || cve,2001-0232
1474 || WEB-CGI cal_make.pl access || cve,2001-0463 || bugtraq,2663
1475 || WEB-CGI mailit.pl access
1476 || WEB-CGI sdbsearch.cgi access || cve,2001-1130
1477 || WEB-CGI swc attempt
1478 || WEB-CGI swc access
1479 || WEB-CGI ttawebtop.cgi arbitrary file attempt || nessus,10696 || cve,2001-0805 || bugtraq,2890
1480 || WEB-CGI ttawebtop.cgi access || nessus,10696 || cve,2001-0805 || bugtraq,2890
1481 || WEB-CGI upload.cgi access || nessus,10290
1482 || WEB-CGI view_source access || nessus,10294
1483 || WEB-CGI ustorekeeper.pl access || nessus,10646 || cve,2001-0466
1484 || WEB-IIS /isapi/tstisapi.dll access || cve,2001-0302 || bugtraq,2381
1485 || WEB-IIS mkilog.exe access
1486 || WEB-IIS ctss.idc access
1487 || WEB-IIS /iisadmpwd/aexp2.htr access
1488 || WEB-CGI store.cgi directory traversal attempt || nessus,10639 || cve,2001-0305 || bugtraq,2385
1489 || WEB-MISC /~nobody access
1490 || WEB-PHP Phorum /support/common.php attempt
1491 || WEB-PHP Phorum /support/common.php access
1492 || WEB-MISC RBS ISP /newuser directory traversal attempt
1493 || WEB-MISC RBS ISP /newuser access
1494 || WEB-CGI SIX webboard generate.cgi attempt || cve,2001-1115 || bugtraq,3175
1495 || WEB-CGI SIX webboard generate.cgi access || cve,2001-1115 || bugtraq,3175
1496 || WEB-CGI spin_client.cgi access
1497 || WEB-MISC cross site scripting attempt
1498 || WEB-MISC PIX firewall manager directory traversal attempt
1499 || WEB-MISC SiteScope Service access || nessus,10778
1500 || WEB-MISC ExAir access || cve,1999-0449 || bugtraq,193
1501 || WEB-CGI a1stats a1disp3.cgi directory traversal attempt || nessus,10669 || cve,2001-0561 || bugtraq,2705
1502 || WEB-CGI a1stats a1disp3.cgi access || nessus,10669 || cve,2001-0561 || bugtraq,2705
1503 || WEB-CGI admentor admin.asp access || url,www.securiteam.com/windowsntfocus/5DP0N1F6AW.html || nessus,10880 || cve,2002-0308 || bugtraq,4152
1504 || MISC AFS access || nessus,10441
1505 || WEB-CGI alchemy http server PRN arbitrary command execution attempt || cve,2001-0871 || bugtraq,3599
1506 || WEB-CGI alchemy http server NUL arbitrary command execution attempt || cve,2001-0871 || bugtraq,3599
1507 || WEB-CGI alibaba.pl arbitrary command execution attempt || nessus,10013 || cve,1999-0885
1508 || WEB-CGI alibaba.pl access || cve ,CAN-1999-0885
1509 || WEB-CGI AltaVista Intranet Search directory traversal attempt || nessus,10015 || cve,2000-0039 || bugtraq,896
1510 || WEB-CGI test.bat arbitrary command execution attempt || nessus,10016 || cve,1999-0947 || bugtraq,762
1511 || WEB-CGI test.bat access || nessus,10016 || cve,1999-0947 || bugtraq,762
1512 || WEB-CGI input.bat arbitrary command execution attempt || nessus,10016 || cve,1999-0947 || bugtraq,762
1513 || WEB-CGI input.bat access || nessus,10016 || cve,1999-0947 || bugtraq,762
1514 || WEB-CGI input2.bat arbitrary command execution attempt || nessus,10016 || cve,1999-0947 || bugtraq,762
1515 || WEB-CGI input2.bat access || nessus,10016 || cve,1999-0947 || bugtraq,762
1516 || WEB-CGI envout.bat arbitrary command execution attempt || nessus,10016 || cve,1999-0947 || bugtraq,762
1517 || WEB-CGI envout.bat access || nessus,10016 || cve,1999-0947 || bugtraq,762
1518 || WEB-MISC nstelemetry.adp access
1519 || WEB-MISC apache ?M=D directory list attempt || cve,2001-0731 || bugtraq,3009
1520 || WEB-MISC server-info access || url,httpd.apache.org/docs/mod/mod_info.html
1521 || WEB-MISC server-status access || url,httpd.apache.org/docs/mod/mod_info.html
1522 || WEB-MISC ans.pl attempt || nessus,10875 || cve,2002-0307 || cve,2002-0306 || bugtraq,4149 || bugtraq,4147
1523 || WEB-MISC ans.pl access || nessus,10875 || cve,2002-0307 || cve,2002-0306 || bugtraq,4149 || bugtraq,4147
1524 || WEB-MISC AxisStorpoint CD attempt || nessus,10023 || cve,2000-0191 || bugtraq,1025
1525 || WEB-MISC Axis Storpoint CD access || nessus,10023 || cve,2000-0191 || bugtraq,1025
1526 || WEB-MISC basilix sendmail.inc access || nessus,10601 || cve,2001-1044
1527 || WEB-MISC basilix mysql.class access || nessus,10601 || cve,2001-1044
1528 || WEB-MISC BBoard access || nessus,10507 || cve,2000-0629 || bugtraq,1459
1529 || FTP SITE overflow attempt || cve,2001-0770 || cve,2001-0755 || cve,1999-0838
1530 || FTP format string attempt
1531 || WEB-CGI bb-hist.sh attempt || nessus,10025 || cve,1999-1462 || bugtraq,142
1532 || WEB-CGI bb-hostscv.sh attempt || nessus,10460 || cve,2000-0638 || bugtraq,1455
1533 || WEB-CGI bb-hostscv.sh access || nessus,10460 || cve,2000-0638 || bugtraq,1455
1534 || WEB-CGI agora.cgi attempt || nessus,10836 || cve,2002-0215 || cve,2001-1199 || bugtraq,3976 || bugtraq,3702
1535 || WEB-CGI bizdbsearch access || cve,2000-0287 || bugtraq,1104
1536 || WEB-CGI calendar_admin.pl arbitrary command execution attempt || cve,2000-0432
1537 || WEB-CGI calendar_admin.pl access || cve,2000-0432
1538 || NNTP AUTHINFO USER overflow attempt || cve,2000-0341 || bugtraq,1156 || arachnids,274
1539 || WEB-CGI /cgi-bin/ls access || cve,2000-0079 || bugtraq,936
1540 || WEB-COLDFUSION ?Mode=debug attempt
1541 || FINGER version query
1542 || WEB-CGI cgimail access || cve,2000-0726
1543 || WEB-CGI cgiwrap access || nessus,10041 || cve,2001-0987 || cve,2000-0431 || cve,1999-1530 || bugtraq,777 || bugtraq,3084 || bugtraq,1238
1544 || WEB-MISC Cisco Catalyst command execution attempt || cve,2000-0945 || bugtraq,1846
1545 || DOS Cisco attempt
1546 || WEB-MISC Cisco /%% DOS attempt || cve,2000-0380 || bugtraq,1154
1547 || WEB-CGI csSearch.cgi arbitrary command execution attempt || nessus,10924 || cve,2002-0495 || bugtraq,4368
1548 || WEB-CGI csSearch.cgi access || nessus,10924 || cve,2002-0495 || bugtraq,4368
1549 || SMTP HELO overflow attempt || nessus,11674 || nessus,10324 || cve,2000-0042 || bugtraq,895 || bugtraq,7726
1550 || SMTP ETRN overflow attempt || cve,2000-0490 || bugtraq,1297
1551 || WEB-MISC /CVS/Entries access
1552 || WEB-MISC cvsweb version access || cve,2000-0670
1553 || WEB-CGI /cart/cart.cgi access || cve,2000-0252 || bugtraq,1115
1554 || WEB-CGI dbman db.cgi access || nessus,10403 || cve,2000-0381 || bugtraq,1178
1555 || WEB-CGI DCShop access || cve,2001-0821 || bugtraq,2889
1556 || WEB-CGI DCShop orders.txt access || cve,2001-0821 || bugtraq,2889
1557 || WEB-CGI DCShop auth_user_file.txt access || cve,2001-0821 || bugtraq,2889
1558 || WEB-MISC Delegate whois overflow attempt || cve,2000-0165
1559 || WEB-MISC /doc/packages access
1560 || WEB-MISC /doc/ access || cve,1999-0678 || bugtraq,318
1561 || WEB-MISC ?open access
1562 || FTP SITE CHOWN overflow attempt || cve,2001-0065 || bugtraq,2120
1563 || WEB-MISC login.htm attempt || cve,1999-1533 || bugtraq,665
1564 || WEB-MISC login.htm access || cve,1999-1533 || bugtraq,665
1565 || WEB-CGI eshop.pl arbitrary commane execution attempt || cve,2001-1014 || bugtraq,3340
1566 || WEB-CGI eshop.pl access || cve,2001-1014 || bugtraq,3340
1567 || WEB-IIS /exchange/root.asp attempt
1568 || WEB-IIS /exchange/root.asp access
1569 || WEB-CGI loadpage.cgi directory traversal attempt
1570 || WEB-CGI loadpage.cgi access
1571 || WEB-CGI dcforum.cgi directory traversal attempt || cve,2001-0437 || cve,2001-0436 || bugtraq,2611
1572 || WEB-CGI commerce.cgi arbitrary file access attempt || nessus,10612 || cve,2001-0210 || bugtraq,2361
1573 || WEB-CGI cgiforum.pl attempt || nessus,10552 || cve,2000-1171 || bugtraq,1963
1574 || WEB-CGI directorypro.cgi attempt || cve,2001-0780 || bugtraq,2793
1575 || WEB-MISC Domino mab.nsf access
1576 || WEB-MISC Domino cersvr.nsf access
1577 || WEB-MISC Domino setup.nsf access
1578 || WEB-MISC Domino statrep.nsf access
1579 || WEB-MISC Domino webadmin.nsf access
1580 || WEB-MISC Domino events4.nsf access
1581 || WEB-MISC Domino ntsync4.nsf access
1582 || WEB-MISC Domino collect4.nsf access
1583 || WEB-MISC Domino mailw46.nsf access
1584 || WEB-MISC Domino bookmark.nsf access
1585 || WEB-MISC Domino agentrunner.nsf access
1586 || WEB-MISC Domino mail.box access
1587 || WEB-MISC cgitest.exe access || nessus,10623 || nessus,10040 || cve,2002-0128 || cve,2000-0521 || bugtraq,3885 || bugtraq,1313 || arachnids,265
1588 || WEB-MISC SalesLogix Eviewer access || cve,2000-0289 || cve,2000-0278 || bugtraq,1089 || bugtraq,1078
1589 || WEB-MISC musicat empower attempt
1590 || WEB-CGI faqmanager.cgi arbitrary file access attempt || nessus,10837 || bugtraq,3810
1591 || WEB-CGI faqmanager.cgi access || nessus,10837 || bugtraq,3810
1592 || WEB-CGI /fcgi-bin/echo.exe access || nessus,10838
1593 || WEB-CGI FormHandler.cgi external site redirection attempt || nessus,10075 || cve,1999-1050 || bugtraq,799 || bugtraq,798
1594 || WEB-CGI FormHandler.cgi access || nessus,10075 || cve,1999-1050 || bugtraq,799 || bugtraq,798
1595 || WEB-IIS htimage.exe access || nessus,10376 || cve,2000-0256 || cve,2000-0122 || bugtraq,964 || bugtraq,1117
1597 || WEB-CGI guestbook.cgi access || nessus,10098 || cve,1999-0237
1598 || WEB-CGI Home Free search.cgi directory traversal attempt || cve,2000-0054 || bugtraq,921
1599 || WEB-CGI search.cgi access || cve,2000-0054 || bugtraq,921
1600 || WEB-CGI htsearch arbitrary configuration file attempt || cve,2000-0208
1601 || WEB-CGI htsearch arbitrary file read attempt || cve,2000-0208 || bugtraq,1026
1602 || WEB-CGI htsearch access || cve,2000-0208
1603 || WEB-MISC DELETE attempt
1604 || WEB-MISC iChat directory traversal attempt || cve,1999-0897
1605 || DOS iParty DOS attempt || cve,1999-1566 || bugtraq,6844
1606 || WEB-CGI icat access || cve,1999-1069
1607 || WEB-CGI HyperSeek hsx.cgi access || cve,2001-0253 || bugtraq,2314
1608 || WEB-CGI htmlscript attempt || cve,1999-0264 || bugtraq,2001
1609 || WEB-CGI faxsurvey arbitrary file read attempt || nessus,10067 || cve,1999-0262 || bugtraq,2056
1610 || WEB-CGI formmail arbitrary command execution attempt || nessus,10782 || nessus,10076 || cve,2000-0411 || cve,1999-0172 || bugtraq,2079 || bugtraq,1187 || arachnids,226
1611 || WEB-CGI eXtropia webstore access || cve,2000-1005 || bugtraq,1774
1612 || WEB-MISC ftp.pl attempt || nessus,10467 || cve,2000-0674 || bugtraq,1471
1613 || WEB-MISC handler attempt || nessus,10100 || cve,1999-0148 || bugtraq,380 || arachnids,235
1614 || WEB-MISC Novell Groupwise gwweb.exe attempt || nessus,10877 || cve,1999-1006 || cve,1999-1005 || bugtraq,879
1615 || WEB-MISC htgrep attempt || cve,2000-0832
1616 || DNS named version attempt || nessus,10028 || arachnids,278
1617 || WEB-CGI Bugzilla doeditvotes.cgi access || cve,2002-0011 || bugtraq,3800
1618 || WEB-IIS .asp chunked Transfer-Encoding || nessus,10932 || cve,2002-0079 || cve,2002-0071 || bugtraq,4485 || bugtraq,4474
1619 || EXPERIMENTAL WEB-IIS .htr request || nessus,10932 || cve,2002-0071 || bugtraq,4474
1620 || BAD TRAFFIC Non-Standard IP protocol
1621 || FTP CMD overflow attempt
1622 || FTP RNFR ././ attempt
1623 || FTP invalid MODE
1624 || FTP large PWD command
1625 || FTP large SYST command
1626 || WEB-IIS /StoreCSVS/InstantOrder.asmx request
1627 || BAD-TRAFFIC Unassigned/Reserved IP protocol || url,www.iana.org/assignments/protocol-numbers
1628 || WEB-CGI FormHandler.cgi directory traversal attempt attempt || nessus,10075 || cve,1999-1050 || bugtraq,799 || bugtraq,798
1629 || OTHER-IDS SecureNetPro traffic
1631 || CHAT AIM login
1632 || CHAT AIM send message
1633 || CHAT AIM receive message
1634 || POP3 PASS overflow attempt || nessus,10325 || cve,1999-1511
1635 || POP3 APOP overflow attempt || nessus,10559 || cve,2000-0841 || cve,2000-0840 || bugtraq,1652
1636 || MISC Xtramail Username overflow attempt || cve,1999-1511 || bugtraq,791
1637 || WEB-CGI yabb access || cve,2000-0853 || bugtraq,1668 || arachnids,462
1638 || SCAN SSH Version map attempt
1639 || CHAT IRC DCC file transfer request
1640 || CHAT IRC DCC chat request
1641 || DOS DB2 dos attempt
1642 || WEB-CGI document.d2w access || cve,2000-1110 || bugtraq,2017
1643 || WEB-CGI db2www access || cve,2000-0677
1644 || WEB-CGI test-cgi attempt || nessus,10282 || cve,1999-0070 || bugtraq,2003 || arachnids,218
1645 || WEB-CGI testcgi access || nessus,11610 || bugtraq,7214
1646 || WEB-CGI test.cgi access
1647 || WEB-CGI faxsurvey attempt full path || nessus,10067 || cve,1999-0262 || bugtraq,2056
1648 || WEB-CGI perl.exe command attempt || url,www.cert.org/advisories/CA-1996-11.html || nessus,10173 || cve,1999-0509 || arachnids,219
1649 || WEB-CGI perl command attempt || url,www.cert.org/advisories/CA-1996-11.html || nessus,10173 || cve,1999-0509 || arachnids,219
1650 || WEB-CGI tst.bat access || nessus,10013 || cve,1999-0885 || bugtraq,770
1651 || WEB-CGI enivorn.pl access
1652 || WEB-CGI campus attempt || bugtraq,1975
1653 || WEB-CGI campus access || bugtraq,1975
1654 || WEB-CGI cart32.exe access
1655 || WEB-CGI pfdispaly.cgi arbitrary command execution attempt
1656 || WEB-CGI pfdispaly.cgi access
1657 || WEB-CGI pagelog.cgi directory traversal attempt || nessus,10591 || cve,2000-0940 || bugtraq,1864
1658 || WEB-CGI pagelog.cgi access || nessus,10591 || cve,2000-0940 || bugtraq,1864
1659 || WEB-COLDFUSION sendmail.cfm access
1660 || WEB-IIS trace.axd access
1661 || WEB-IIS cmd32.exe access
1662 || WEB-MISC /~ftp access
1663 || WEB-MISC *%0a.pl access
1664 || WEB-MISC mkplog.exe access
1665 || WEB-MISC mkilog.exe access
1666 || ATTACK-RESPONSES index of /cgi-bin/ response || nessus,10039
1667 || WEB-MISC cross site scripting HTML Image tag set to javascript attempt
1668 || WEB-CGI /cgi-bin/ access
1669 || WEB-CGI /cgi-dos/ access
1670 || WEB-MISC /home/ftp access
1671 || WEB-MISC /home/www access
1672 || FTP CWD ~ attempt || cve,2001-0421 || bugtraq,9215 || bugtraq,2601
1673 || ORACLE EXECUTE_SYSTEM attempt
1674 || ORACLE connect_data remote version detection attempt
1675 || ORACLE misparsed login response
1676 || ORACLE select union attempt
1677 || ORACLE select like '%' attempt
1678 || ORACLE select like '%' attempt backslash escaped
1679 || ORACLE describe attempt
1680 || ORACLE all_constraints access
1681 || ORACLE all_views access
1682 || ORACLE all_source access
1683 || ORACLE all_tables access
1684 || ORACLE all_tab_columns access
1685 || ORACLE all_tab_privs access
1686 || ORACLE dba_tablespace access
1687 || ORACLE dba_tables access
1688 || ORACLE user_tablespace access
1689 || ORACLE sys.all_users access
1690 || ORACLE grant attempt
1691 || ORACLE ALTER USER attempt
1692 || ORACLE drop table attempt
1693 || ORACLE create table attempt
1694 || ORACLE alter table attempt
1695 || ORACLE truncate table attempt
1696 || ORACLE create database attempt
1697 || ORACLE alter database attempt
1698 || ORACLE execute_system attempt
1699 || P2P Fastrack kazaa/morpheus traffic || url,www.kazaa.com
1700 || WEB-CGI imagemap.exe access || nessus,10122 || cve,1999-0951 || bugtraq,739 || arachnids,412
1701 || WEB-CGI calendar-admin.pl access || bugtraq,1215
1702 || WEB-CGI Amaya templates sendtemp.pl access || cve,2001-0272 || bugtraq,2504
1703 || WEB-CGI auktion.cgi directory traversal attempt || nessus,10638 || cve,2001-0212 || bugtraq,2367
1704 || WEB-CGI cal_make.pl directory traversal attempt || cve,2001-0463 || bugtraq,2663
1705 || WEB-CGI echo.bat arbitrary command execution attempt || nessus,10246 || cve,2000-0213 || bugtraq,1002
1706 || WEB-CGI echo.bat access || nessus,10246 || cve,2000-0213 || bugtraq,1002
1707 || WEB-CGI hello.bat arbitrary command execution attempt || nessus,10246 || cve,2000-0213 || bugtraq,1002
1708 || WEB-CGI hello.bat access || nessus,10246 || cve,2000-0213 || bugtraq,1002
1709 || WEB-CGI ad.cgi access
1710 || WEB-CGI bbs_forum.cgi access
1711 || WEB-CGI bsguest.cgi access
1712 || WEB-CGI bslist.cgi access
1713 || WEB-CGI cgforum.cgi access
1714 || WEB-CGI newdesk access
1715 || WEB-CGI register.cgi access
1716 || WEB-CGI gbook.cgi access || cve,2000-1131 || bugtraq,1940
1717 || WEB-CGI simplestguest.cgi access
1718 || WEB-CGI statusconfig.pl access
1719 || WEB-CGI talkback.cgi directory traversal attempt
1720 || WEB-CGI talkback.cgi access
1721 || WEB-CGI adcycle access
1722 || WEB-CGI MachineInfo access
1723 || WEB-CGI emumail.cgi NULL attempt || cve,2002-1526 || bugtraq,5824
1724 || WEB-CGI emumail.cgi access || cve,2002-1526 || bugtraq,5824
1725 || WEB-IIS +.htr code fragment attempt || cve,2000-0630 || bugtraq,1488
1726 || WEB-IIS doctodep.btr access
1727 || WEB-CGI SGI InfoSearch fname access || cve,2000-0207 || bugtraq,1031 || arachnids,290
1728 || FTP CWD ~<CR><NEWLINE> attempt || cve,2001-0421 || bugtraq,2601
1729 || CHAT IRC channel join
1730 || WEB-CGI ustorekeeper.pl directory traversal attempt || nessus,10645 || cve,2001-0466
1731 || WEB-CGI a1stats access || nessus,10669 || cve,2001-0561 || bugtraq,2705
1732 || RPC portmap rwalld request UDP
1733 || RPC portmap rwalld request TCP
1734 || FTP USER overflow attempt || cve,2002-0126 || cve,2001-0826 || cve,2001-0794 || cve,2000-1194 || cve,2000-1035 || cve,2000-0943 || cve,2000-0656 || cve,2000-0479 || bugtraq,4638 || bugtraq,1690 || bugtraq,1504 || bugtraq,1227
1735 || WEB-CLIENT XMLHttpRequest attempt
1736 || WEB-PHP squirrel mail spell-check arbitrary command attempt || bugtraq,3952
1737 || WEB-PHP squirrel mail theme arbitrary command attempt || cve,2002-0516 || bugtraq,4385
1738 || WEB-MISC global.inc access || cve,2002-0614 || bugtraq,4612
1739 || WEB-PHP DNSTools administrator authentication bypass attempt || cve,2002-0613 || bugtraq,4617
1740 || WEB-PHP DNSTools authentication bypass attempt || cve,2002-0613 || bugtraq,4617
1741 || WEB-PHP DNSTools access || cve,2002-0613 || bugtraq,4617
1742 || WEB-PHP Blahz-DNS dostuff.php modify user attempt || cve,2002-0599 || bugtraq,4618
1743 || WEB-PHP Blahz-DNS dostuff.php access || cve,2002-0599 || bugtraq,4618
1744 || WEB-MISC SecureSite authentication bypass attempt || bugtraq,4621
1745 || WEB-PHP Messagerie supp_membre.php access || bugtraq,4635
1746 || RPC portmap cachefsd request UDP || cve,2002-0084 || cve,2002-0033 || bugtraq,4674
1747 || RPC portmap cachefsd request TCP || cve,2002-0084 || cve,2002-0033 || bugtraq,4674
1748 || FTP command overflow attempt || cve,2002-0606 || bugtraq,4638
1749 || EXPERIMENTAL WEB-IIS .NET trace.axd access
1750 || WEB-IIS users.xml access
1751 || EXPLOIT cachefsd buffer overflow attempt || cve,2002-0084 || bugtraq,4631
1752 || MISC AIM AddExternalApp attempt || url,www.w00w00.org/files/w00aimexp/
1753 || WEB-IIS as_web.exe access || bugtraq,4670
1754 || WEB-IIS as_web4.exe access || bugtraq,4670
1755 || IMAP partial body buffer overflow attempt || cve,2002-0379 || bugtraq,4713
1756 || WEB-IIS NewsPro administration authentication attempt
1757 || WEB-MISC b2 arbitrary command execution attempt
1758 || WEB-MISC b2 access
1759 || MS-SQL xp_cmdshell program execution 445
1760 || OTHER-IDS ISS RealSecure 6 event collector connection attempt
1761 || OTHER-IDS ISS RealSecure 6 daemon connection attempt
1762 || WEB-CGI phf arbitrary command execution attempt || cve,1999-0067 || bugtraq,629 || arachnids,128
1763 || WEB-CGI Nortel Contivity cgiproc DOS attempt || nessus,10160 || cve,2000-0064 || cve,2000-0063 || bugtraq,938
1764 || WEB-CGI Nortel Contivity cgiproc DOS attempt || nessus,10160 || cve,2000-0064 || cve,2000-0063 || bugtraq,938
1765 || WEB-CGI Nortel Contivity cgiproc access || nessus,10160 || cve,2000-0064 || cve,2000-0063 || bugtraq,938
1766 || WEB-MISC search.dll directory listing attempt || nessus,10514 || cve,2000-0835 || bugtraq,1684
1767 || WEB-MISC search.dll access || nessus,10514 || cve,2000-0835 || bugtraq,1684
1768 || WEB-IIS header field buffer overflow attempt || cve,2002-0150 || bugtraq,4476
1769 || WEB-MISC .DS_Store access || url,www.macintouch.com/mosxreaderreports46.html
1770 || WEB-MISC .FBCIndex access || url,www.securiteam.com/securitynews/5LP0O005FS.html
1771 || POLICY IPSec PGPNet connection attempt
1772 || WEB-IIS pbserver access || url,www.microsoft.com/technet/security/bulletin/ms00-094.mspx
1773 || WEB-PHP php.exe access || url,www.securitytracker.com/alerts/2002/Jan/1003104.html
1774 || WEB-PHP bb_smilies.php access || url,www.securiteam.com/securitynews/Serious_security_hole_in_PHP-Nuke__bb_smilies_.html
1775 || MYSQL root login attempt
1776 || MYSQL show databases attempt
1777 || FTP EXPLOIT STAT * dos attempt || cve,2002-0073 || bugtraq,4482
1778 || FTP EXPLOIT STAT ? dos attempt || cve,2002-0073 || bugtraq,4482
1779 || FTP CWD .... attempt || bugtraq,4884
1780 || IMAP EXPLOIT partial body overflow attempt || cve,2002-0379 || bugtraq,4713
1781 || PORN dildo
1782 || PORN nipple clamp
1783 || PORN oral sex
1784 || PORN nude celeb
1785 || PORN voyeur
1786 || PORN raw sex
1787 || WEB-CGI csPassword.cgi access || cve,2002-0918 || cve,2002-0917 || bugtraq,4889 || bugtraq,4887 || bugtraq,4886 || bugtraq,4885
1788 || WEB-CGI csPassword password.cgi.tmp access || cve,2002-0920 || bugtraq,4889
1789 || CHAT IRC dns request
1790 || CHAT IRC dns response
1791 || BACKDOOR fragroute trojan connection attempt || bugtraq,4898
1792 || NNTP return code buffer overflow attempt || cve,2002-0909 || bugtraq,4900
1793 || PORN fetish
1794 || PORN masturbation
1795 || PORN ejaculation
1796 || PORN virgin
1797 || PORN BDSM
1798 || PORN erotica
1799 || PORN fisting
1800 || VIRUS Klez Incoming
1801 || WEB-IIS .asp HTTP header buffer overflow attempt || cve,2002-0150 || bugtraq,4476
1802 || WEB-IIS .asa HTTP header buffer overflow attempt || cve,2002-0150 || bugtraq,4476
1803 || WEB-IIS .cer HTTP header buffer overflow attempt || cve,2002-0150 || bugtraq,4476
1804 || WEB-IIS .cdx HTTP header buffer overflow attempt || cve,2002-0150 || bugtraq,4476
1805 || WEB-CGI Oracle reports CGI access || cve,2002-0947 || bugtraq,4848
1806 || WEB-IIS .htr chunked Transfer-Encoding || cve,2002-0364 || bugtraq,5003 || bugtraq,4855
1807 || WEB-MISC Chunked-Encoding transfer attempt || cve,2002-0392 || cve,2002-0079 || cve,2002-0071 || bugtraq,5033 || bugtraq,4485 || bugtraq,4474
1808 || WEB-MISC apache chunked encoding memory corruption exploit attempt || cve,2002-0392 || bugtraq,5033
1809 || WEB-MISC Apache Chunked-Encoding worm attempt || cve,2002-0392 || cve,2002-0079 || cve,2002-0071 || bugtraq,5033 || bugtraq,4485 || bugtraq,4474
1810 || ATTACK-RESPONSES successful gobbles ssh exploit GOBBLE || cve,2002-0639 || cve,2002-0390 || bugtraq,5093
1811 || ATTACK-RESPONSES successful gobbles ssh exploit uname || cve,2002-0639 || cve,2002-0390 || bugtraq,5093
1812 || EXPLOIT gobbles SSH exploit attempt || cve,2002-0639 || cve,2002-0390 || bugtraq,5093
1813 || ICMP digital island bandwidth query
1814 || WEB-MISC CISCO VoIP DOS ATTEMPT || cve,2002-0882 || bugtraq,4798 || bugtraq,4794
1815 || WEB-PHP directory.php arbitrary command attempt || cve,2002-0434 || bugtraq,4278
1816 || WEB-PHP directory.php access || cve,2002-0434 || bugtraq,4278
1817 || WEB-IIS MS Site Server default login attempt || nessus,11018
1818 || WEB-IIS MS Site Server admin attempt || nessus,11018
1819 || MISC Alcatel PABX 4400 connection attempt || nessus,11019
1820 || WEB-MISC IBM Net.Commerce orderdspc.d2w access || nessus,11020 || cve,2001-0319 || bugtraq,2350
1821 || EXPLOIT LPD dvips remote command execution attempt || nessus,11023 || cve,2001-1002 || bugtraq,3241
1822 || WEB-CGI alienform.cgi directory traversal attempt || nessus,11027 || cve,2002-0934 || bugtraq,4983
1823 || WEB-CGI AlienForm af.cgi directory traversal attempt || nessus,11027 || cve,2002-0934 || bugtraq,4983
1824 || WEB-CGI alienform.cgi access || nessus,11027 || cve,2002-0934 || bugtraq,4983
1825 || WEB-CGI AlienForm af.cgi access || nessus,11027 || cve,2002-0934 || bugtraq,4983
1826 || WEB-MISC WEB-INF access || nessus,11037
1827 || WEB-MISC Tomcat servlet mapping cross site scripting attempt || nessus,11041 || cve,2002-0682 || bugtraq,5193
1828 || WEB-MISC iPlanet Search directory traversal attempt || nessus,11043 || cve,2002-1042 || bugtraq,5191
1829 || WEB-MISC Tomcat TroubleShooter servlet access || nessus,11046 || bugtraq,4575
1830 || WEB-MISC Tomcat SnoopServlet servlet access || nessus,11046 || bugtraq,4575
1831 || WEB-MISC jigsaw dos attempt || nessus,11047
1832 || CHAT ICQ forced user addition || cve,2001-1305 || bugtraq,3226
1833 || PORN naked lesbians
1834 || WEB-PHP PHP-Wiki cross site scripting attempt || cve,2002-1070 || bugtraq,5254
1835 || WEB-MISC Macromedia SiteSpring cross site scripting attempt || cve,2002-1027 || bugtraq,5249
1836 || PORN alt.binaries.pictures.erotica
1837 || PORN alt.binaries.pictures.tinygirls
1838 || EXPLOIT SSH server banner overflow || cve,2002-1059 || bugtraq,5287
1839 || WEB-MISC mailman cross site scripting attempt || cve,2002-0855 || bugtraq,5298
1840 || WEB-CLIENT Javascript document.domain attempt || bugtraq,5346
1841 || WEB-CLIENT Javascript URL host spoofing attempt || bugtraq,5293
1842 || IMAP login buffer overflow attempt || nessus,10125 || cve,1999-0005
1843 || BACKDOOR trinity connection attempt || nessus,10501 || cve,2000-0138
1844 || IMAP authenticate overflow attempt || nessus,10292 || cve,1999-0042
1845 || IMAP list literal overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
1846 || POLICY vncviewer Java applet download attempt || nessus,10758
1847 || WEB-MISC webalizer access || nessus,10816 || cve,2001-0835 || cve,1999-0643 || bugtraq,3473
1848 || WEB-MISC webcart-lite access || nessus,10298 || cve,1999-0610
1849 || WEB-MISC webfind.exe access || nessus,10475 || cve,2000-0622 || bugtraq,1487
1850 || WEB-CGI way-board.cgi access || nessus,10610
1851 || WEB-MISC active.log access || nessus,10470 || cve,2000-0642 || bugtraq,1497
1852 || WEB-MISC robots.txt access || nessus,10302
1853 || BACKDOOR win-trin00 connection attempt || nessus,10307 || cve,2000-0138
1854 || DDOS Stacheldraht handler->agent niggahbitch || url,staff.washington.edu/dittrich/misc/stacheldraht.analysis
1855 || DDOS Stacheldraht agent->handler skillz || url,staff.washington.edu/dittrich/misc/stacheldraht.analysis
1856 || DDOS Stacheldraht handler->agent ficken || url,staff.washington.edu/dittrich/misc/stacheldraht.analysis
1857 || WEB-MISC robot.txt access || nessus,10302
1858 || WEB-MISC CISCO PIX Firewall Manager directory traversal attempt || nessus,10819 || cve,1999-0158 || bugtraq,691
1859 || WEB-MISC Sun JavaServer default password login attempt || nessus,10995 || cve,1999-0508
1860 || WEB-MISC Linksys router default password login attempt || nessus,10999
1861 || WEB-MISC Linksys router default username and password login attempt || nessus,10999
1862 || WEB-CGI mrtg.cgi directory traversal attempt || nessus,11001 || cve,2002-0232 || bugtraq,4017
1864 || FTP SITE NEWER attempt || nessus,10319 || cve,1999-0880
1865 || WEB-CGI webdist.cgi arbitrary command attempt || nessus,10299 || cve,1999-0039 || bugtraq,374
1866 || POP3 USER overflow attempt || nessus,10311 || cve,1999-0494 || bugtraq,789
1867 || MISC xdmcp info query || nessus,10891
1868 || WEB-CGI story.pl arbitrary file read attempt || nessus,10817 || cve,2001-0804 || bugtraq,3028
1869 || WEB-CGI story.pl access || nessus,10817 || cve,2001-0804 || bugtraq,3028
1870 || WEB-CGI siteUserMod.cgi access || nessus,10253 || cve,2000-0117 || bugtraq,951
1871 || WEB-MISC Oracle XSQLConfig.xml access || nessus,10855 || cve,2002-0568 || bugtraq,4290
1872 || WEB-MISC Oracle Dynamic Monitoring Services dms access || nessus,10848
1873 || WEB-MISC globals.jsa access || nessus,10850 || cve,2002-0562 || bugtraq,4034
1874 || WEB-MISC Oracle Java Process Manager access || nessus,10851
1875 || WEB-CGI cgicso access || nessus,10780 || nessus,10779 || bugtraq,6141
1876 || WEB-CGI nph-publish.cgi access || nessus,10164 || cve,1999-1177
1877 || WEB-CGI printenv access || nessus,10503 || cve,2000-0868 || bugtraq,1658
1878 || WEB-CGI sdbsearch.cgi access || nessus,10503 || cve,2000-0868 || bugtraq,1658
1879 || WEB-CGI book.cgi arbitrary command execution attempt || nessus,10721 || cve,2001-1114 || bugtraq,3178
1880 || WEB-MISC oracle web application server access || nessus,10348 || cve,2000-0169 || bugtraq,1053
1881 || WEB-MISC bad HTTP/1.1 request, Potentially worm attack || url,securityresponse.symantec.com/avcenter/security/Content/2002.09.13.html
1882 || ATTACK-RESPONSES id check returned userid
1883 || ATTACK-RESPONSES id check returned nobody
1884 || ATTACK-RESPONSES id check returned web
1885 || ATTACK-RESPONSES id check returned http
1886 || ATTACK-RESPONSES id check returned apache
1887 || MISC OpenSSL Worm traffic || url,www.cert.org/advisories/CA-2002-27.html
1888 || FTP SITE CPWD overflow attempt || cve,2002-0826 || bugtraq,5427
1889 || MISC slapper worm admin traffic || url,www.cert.org/advisories/CA-2002-27.html || url,isc.incidents.org/analysis.html?id=167
1890 || RPC status GHBN format string attack || cve,2000-0666 || bugtraq,1480
1891 || RPC status GHBN format string attack || cve,2000-0666 || bugtraq,1480
1892 || SNMP null community string attempt || cve,1999-0517 || bugtraq,8974 || bugtraq,2112
1893 || SNMP missing community string attempt || cve,1999-0517 || bugtraq,2112
1894 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1895 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1896 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1897 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1898 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1899 || EXPLOIT kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1900 || ATTACK-RESPONSES successful kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1901 || ATTACK-RESPONSES successful kadmind buffer overflow attempt || url,www.kb.cert.org/vuls/id/875073 || cve,2002-1235 || cve,2002-1226 || bugtraq,6024 || bugtraq,5731
1902 || IMAP lsub literal overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
1903 || IMAP rename overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
1904 || IMAP find overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
1905 || RPC AMD UDP amqproc_mount plog overflow attempt || cve,1999-0704 || bugtraq,614
1906 || RPC AMD TCP amqproc_mount plog overflow attempt || cve,1999-0704 || bugtraq,614
1907 || RPC CMSD UDP CMSD_CREATE buffer overflow attempt || cve,1999-0696 || bugtraq,524
1908 || RPC CMSD TCP CMSD_CREATE buffer overflow attempt || cve,1999-0696 || bugtraq,524
1909 || RPC CMSD TCP CMSD_INSERT buffer overflow attempt || url,www.cert.org/advisories/CA-99-08-cmsd.html || cve,1999-0696
1910 || RPC CMSD udp CMSD_INSERT buffer overflow attempt || url,www.cert.org/advisories/CA-99-08-cmsd.html || cve,1999-0696
1911 || RPC sadmind UDP NETMGT_PROC_SERVICE CLIENT_DOMAIN overflow attempt || cve,1999-0977 || bugtraq,866 || bugtraq,0866
1912 || RPC sadmind TCP NETMGT_PROC_SERVICE CLIENT_DOMAIN overflow attempt || cve,1999-0977 || bugtraq,866 || bugtraq,0866
1913 || RPC STATD UDP stat mon_name format string exploit attempt || cve,2000-0666 || bugtraq,1480
1914 || RPC STATD TCP stat mon_name format string exploit attempt || cve,2000-0666 || bugtraq,1480
1915 || RPC STATD UDP monitor mon_name format string exploit attempt || cve,2000-0666 || bugtraq,1480
1916 || RPC STATD TCP monitor mon_name format string exploit attempt || cve,2000-0666 || bugtraq,1480
1917 || SCAN UPnP service discover attempt
1918 || SCAN SolarWinds IP scan attempt
1919 || FTP CWD overflow attempt || cve,2002-0126 || cve,2000-1194 || cve,2000-1035 || bugtraq,7950 || bugtraq,1690 || bugtraq,1227
1920 || FTP SITE NEWER overflow attempt || cve,1999-0800 || bugtraq,229
1921 || FTP SITE ZIPCHK overflow attempt || cve,2000-0040
1922 || RPC portmap proxy attempt TCP
1923 || RPC portmap proxy attempt UDP
1924 || RPC mountd UDP export request || arachnids,26
1925 || RPC mountd TCP exportall request || arachnids,26
1926 || RPC mountd UDP exportall request || arachnids,26
1927 || FTP authorized_keys
1928 || FTP shadow retrieval attempt
1929 || BACKDOOR TCPDUMP/PCAP trojan traffic || url,hlug.fscker.com
1930 || IMAP auth literal overflow attempt || cve,1999-0005
1931 || WEB-CGI rpc-nlog.pl access || cve,1999-1278
1932 || WEB-CGI rpc-smb.pl access || cve,1999-1278
1933 || WEB-CGI cart.cgi access
1934 || POP2 FOLD overflow attempt || cve,1999-0920 || bugtraq,283
1935 || POP2 FOLD arbitrary file attempt
1936 || POP3 AUTH overflow attempt
1937 || POP3 LIST overflow attempt || cve,2000-0096 || bugtraq,948
1938 || POP3 XTND overflow attempt
1939 || MISC bootp hardware address length overflow || cve,1999-0798
1940 || MISC bootp invalid hardware type || cve,1999-0798
1941 || TFTP GET filename overflow attempt || cve,2002-0813 || bugtraq,5328
1942 || FTP RMDIR overflow attempt
1943 || WEB-MISC /Carello/add.exe access || cve,2000-0396 || bugtraq,1245
1944 || WEB-MISC /ecscripts/ecware.exe access
1945 || WEB-IIS unicode directory traversal attempt || cve,2000-0884 || bugtraq,1806
1946 || WEB-MISC answerbook2 admin attempt
1947 || WEB-MISC answerbook2 arbitrary command execution attempt
1948 || DNS zone transfer UDP || cve,1999-0532 || arachnids,212
1949 || RPC portmap SET attempt TCP 111
1950 || RPC portmap SET attempt UDP 111
1951 || RPC mountd TCP mount request
1952 || RPC mountd UDP mount request
1953 || RPC AMD TCP pid request
1954 || RPC AMD UDP pid request
1955 || RPC AMD TCP version request
1956 || RPC AMD UDP version request
1957 || RPC sadmind UDP PING || bugtraq,866
1958 || RPC sadmind TCP PING || bugtraq,866
1959 || RPC portmap NFS request UDP
1960 || RPC portmap NFS request TCP
1961 || RPC portmap RQUOTA request UDP
1962 || RPC portmap RQUOTA request TCP
1963 || RPC RQUOTA getquota overflow attempt UDP || cve,1999-0974 || bugtraq,864
1964 || RPC tooltalk UDP overflow attempt || cve,1999-0003 || bugtraq,122
1965 || RPC tooltalk TCP overflow attempt || cve,1999-0003 || bugtraq,122
1966 || MISC GlobalSunTech Access Point Information Disclosure attempt || bugtraq,6100
1967 || WEB-PHP phpbb quick-reply.php arbitrary command attempt || bugtraq,6173
1968 || WEB-PHP phpbb quick-reply.php access || bugtraq,6173
1969 || WEB-MISC ion-p access || cve,2002-1559 || bugtraq,6091
1970 || WEB-IIS MDAC Content-Type overflow attempt || url,www.foundstone.com/knowledge/randd-advisories-display.html?id=337 || cve,2002-1142 || bugtraq,6214
1971 || FTP SITE EXEC format string attempt
1972 || FTP PASS overflow attempt || cve,2002-0126 || cve,2000-1035 || bugtraq,9285 || bugtraq,8601 || bugtraq,3884 || bugtraq,1690
1973 || FTP MKD overflow attempt || cve,1999-0911 || bugtraq,9872 || bugtraq,612
1974 || FTP REST overflow attempt || cve,2001-0826 || bugtraq,2972
1975 || FTP DELE overflow attempt || cve,2001-0826 || bugtraq,2972
1976 || FTP RMD overflow attempt || cve,2001-0826 || bugtraq,2972
1977 || WEB-MISC xp_regwrite attempt
1978 || WEB-MISC xp_regdeletekey attempt
1979 || WEB-MISC perl post attempt || nessus,11158 || cve,2002-1436 || bugtraq,5520
1980 || BACKDOOR DeepThroat 3.1 Connection attempt
1981 || BACKDOOR DeepThroat 3.1 Connection attempt [3150]
1982 || BACKDOOR DeepThroat 3.1 Server Response [3150] || arachnids,106
1983 || BACKDOOR DeepThroat 3.1 Connection attempt [4120]
1984 || BACKDOOR DeepThroat 3.1 Server Response [4120] || arachnids,106
1985 || BACKDOOR Doly 1.5 server response
1986 || CHAT MSN file transfer request
1987 || MISC xfs overflow attempt || nessus,11188 || cve,2002-1317 || bugtraq,6241
1988 || CHAT MSN file transfer accept
1989 || CHAT MSN file transfer reject
1990 || CHAT MSN user search
1991 || CHAT MSN login attempt
1992 || FTP LIST directory traversal attempt || nessus,11112 || cve,2001-0680 || bugtraq,2618
1993 || IMAP login literal buffer overflow attempt || bugtraq,6298
1994 || WEB-CGI vpasswd.cgi access || nessus,11165 || bugtraq,6038
1995 || WEB-CGI alya.cgi access || nessus,11118
1996 || WEB-CGI viralator.cgi access || nessus,11107 || cve,2001-0849
1997 || WEB-PHP read_body.php access attempt || cve,2002-1341 || bugtraq,6302
1998 || WEB-PHP calendar.php access || nessus,11179 || bugtraq,9353 || bugtraq,5820
1999 || WEB-PHP edit_image.php access || nessus,11104 || cve,2001-1020 || bugtraq,3288
2000 || WEB-PHP readmsg.php access || nessus,11073
2001 || WEB-CGI smartsearch.cgi access
2002 || WEB-PHP remote include path
2003 || MS-SQL Worm propagation attempt || url,vil.nai.com/vil/content/v_99992.htm || cve,2002-0649 || bugtraq,5311 || bugtraq,5310
2004 || MS-SQL Worm propagation attempt OUTBOUND || url,vil.nai.com/vil/content/v_99992.htm || cve,2002-0649 || bugtraq,5311 || bugtraq,5310
2005 || RPC portmap kcms_server request UDP || url,www.kb.cert.org/vuls/id/850785 || cve,2003-0027 || bugtraq,6665
2006 || RPC portmap kcms_server request TCP || url,www.kb.cert.org/vuls/id/850785 || cve,2003-0027 || bugtraq,6665
2007 || RPC kcms_server directory traversal attempt || url,www.kb.cert.org/vuls/id/850785 || cve,2003-0027 || bugtraq,6665
2008 || MISC CVS invalid user authentication response
2009 || MISC CVS invalid repository response
2010 || MISC CVS double free exploit attempt response || cve,2003-0015 || bugtraq,6650
2011 || MISC CVS invalid directory response || cve,2003-0015 || bugtraq,6650
2012 || MISC CVS missing cvsroot response
2013 || MISC CVS invalid module response
2014 || RPC portmap UNSET attempt TCP 111 || bugtraq,1892
2015 || RPC portmap UNSET attempt UDP 111 || bugtraq,1892
2016 || RPC portmap status request TCP || arachnids,15
2017 || RPC portmap espd request UDP || cve,2001-0331 || bugtraq,2714
2018 || RPC mountd TCP dump request
2019 || RPC mountd UDP dump request
2020 || RPC mountd TCP unmount request
2021 || RPC mountd UDP unmount request
2022 || RPC mountd TCP unmountall request
2023 || RPC mountd UDP unmountall request
2024 || RPC RQUOTA getquota overflow attempt TCP || cve,1999-0974 || bugtraq,864
2025 || RPC yppasswd username overflow attempt UDP || cve,2001-0779 || bugtraq,2763
2026 || RPC yppasswd username overflow attempt TCP || cve,2001-0779 || bugtraq,2763
2027 || RPC yppasswd old password overflow attempt UDP
2028 || RPC yppasswd old password overflow attempt TCP
2029 || RPC yppasswd new password overflow attempt UDP
2030 || RPC yppasswd new password overflow attempt TCP
2031 || RPC yppasswd user update UDP
2032 || RPC yppasswd user update TCP
2033 || RPC ypserv maplist request UDP || cve,2002-1232 || bugtraq,6016 || bugtraq,5914
2034 || RPC ypserv maplist request TCP || bugtraq,6016 || bugtraq,5914 || Cve,CAN-2002-1232
2035 || RPC portmap network-status-monitor request UDP
2036 || RPC portmap network-status-monitor request TCP
2037 || RPC network-status-monitor mon-callback request UDP
2038 || RPC network-status-monitor mon-callback request TCP
2039 || MISC bootp hostname format string attempt || cve,2002-0702 || bugtraq,4701
2040 || POLICY xtacacs login attempt
2041 || MISC xtacacs failed login response
2042 || POLICY xtacacs accepted login response
2043 || MISC isakmp login failed
2044 || POLICY PPTP Start Control Request attempt
2045 || RPC snmpXdmi overflow attempt UDP || url,www.cert.org/advisories/CA-2001-05.html || cve,2001-0236 || bugtraq,2417
2046 || IMAP partial body.peek buffer overflow attempt || cve,2002-0379 || bugtraq,4713
2047 || MISC rsyncd module list access
2048 || MISC rsyncd overflow attempt
2049 || MS-SQL ping attempt || nessus,10674
2050 || MS-SQL version overflow attempt || nessus,10674 || cve,2002-0649 || bugtraq,5310
2051 || WEB-CGI cached_feed.cgi moreover shopping cart access || cve,2000-0906 || bugtraq,1762
2052 || WEB-CGI overflow.cgi access || url,www.cert.org/advisories/CA-2002-35.html || nessus,11190
2053 || WEB-CGI process_bug.cgi access || cve,2002-0008
2054 || WEB-CGI enter_bug.cgi arbitrary command attempt || cve,2002-0008
2055 || WEB-CGI enter_bug.cgi access || cve,2002-0008
2056 || WEB-MISC TRACE attempt || url,www.whitehatsec.com/press_releases/WH-PR-20030120.pdf || nessus,11213 || bugtraq,9561
2057 || WEB-MISC helpout.exe access || nessus,11162 || cve,2002-1169 || bugtraq,6002
2058 || WEB-MISC MsmMask.exe attempt || nessus,11163
2059 || WEB-MISC MsmMask.exe access || nessus,11163
2060 || WEB-MISC DB4Web access || nessus,11180
2061 || WEB-MISC Tomcat null byte directory listing attempt || cve,2003-0042 || bugtraq,6721 || bugtraq,2518
2062 || WEB-MISC iPlanet .perf access
2063 || WEB-MISC Demarc SQL injection attempt
2064 || WEB-MISC Lotus Notes .csp script source download attempt
2065 || WEB-MISC Lotus Notes .csp script source download attempt
2066 || WEB-MISC Lotus Notes .pl script source download attempt
2067 || WEB-MISC Lotus Notes .exe script source download attempt
2068 || WEB-MISC BitKeeper arbitrary command attempt || bugtraq,6588
2069 || WEB-MISC chip.ini access || cve,2001-0771 || cve,2001-0749 || bugtraq,2775 || bugtraq,2755
2070 || WEB-MISC post32.exe arbitrary command attempt || bugtraq,1485
2071 || WEB-MISC post32.exe access || bugtraq,1485
2072 || WEB-MISC lyris.pl access || cve,2000-0758 || bugtraq,1584
2073 || WEB-MISC globals.pl access || cve,2001-0330 || bugtraq,2671
2074 || WEB-PHP Mambo uploadimage.php upload php file attempt || bugtraq,6572
2075 || WEB-PHP Mambo upload.php upload php file attempt || bugtraq,6572
2076 || WEB-PHP Mambo uploadimage.php access || bugtraq,6572
2077 || WEB-PHP Mambo upload.php access || bugtraq,6572
2078 || WEB-PHP phpBB privmsg.php access || bugtraq,6634
2079 || RPC portmap nlockmgr request UDP || cve,2000-0508 || bugtraq,1372
2080 || RPC portmap nlockmgr request TCP || cve,2000-0508 || bugtraq,1372
2081 || RPC portmap rpc.xfsmd request UDP || cve,2002-0359 || bugtraq,5075 || bugtraq,5072
2082 || RPC portmap rpc.xfsmd request TCP || cve,2002-0359 || bugtraq,5075 || bugtraq,5072
2083 || RPC rpc.xfsmd xfs_export attempt UDP || cve,2002-0359 || bugtraq,5075 || bugtraq,5072
2084 || RPC rpc.xfsmd xfs_export attempt TCP || cve,2002-0359 || bugtraq,5075 || bugtraq,5072
2085 || WEB-CGI parse_xml.cgi access || cve,2003-0054 || bugtraq,6960
2086 || WEB-CGI streaming server parse_xml.cgi access || cve,2003-0054 || bugtraq,6960
2087 || SMTP From comment overflow attempt || url,www.kb.cert.org/vuls/id/398025 || cve,2002-1337
2088 || RPC ypupdated arbitrary command attempt UDP
2089 || RPC ypupdated arbitrary command attempt TCP
2090 || WEB-IIS WEBDAV exploit attempt || url,www.microsoft.com/technet/security/bulletin/ms03-007.mspx || cve,2003-0109 || bugtraq,7716 || bugtraq,7116
2091 || WEB-IIS WEBDAV nessus safe scan attempt || url,www.microsoft.com/technet/security/bulletin/ms03-007.mspx || nessus,11413 || nessus,11412 || cve,2003-0109 || bugtraq,7116
2092 || RPC portmap proxy integer overflow attempt UDP || cve,2003-0028 || bugtraq,7123
2093 || RPC portmap proxy integer overflow attempt TCP || cve,2003-0028 || bugtraq,7123
2094 || RPC CMSD UDP CMSD_CREATE array buffer overflow attempt || cve,2002-0391 || bugtraq,5356
2095 || RPC CMSD TCP CMSD_CREATE array buffer overflow attempt || cve,2002-0391 || bugtraq,5356
2100 || BACKDOOR SubSeven 2.1 Gold server connection response
2101 || NETBIOS SMB SMB_COM_TRANSACTION Max Parameter and Max Count of 0 DOS Attempt || url,www.microsoft.com/technet/security/bulletin/MS02-045.mspx || url,www.corest.com/common/showdoc.php?idx=262 || cve,2002-0724 || bugtraq,5556
2102 || NETBIOS SMB SMB_COM_TRANSACTION Max Data Count of 0 DOS Attempt || url,www.microsoft.com/technet/security/bulletin/MS02-045.mspx || url,www.corest.com/common/showdoc.php?idx=262 || cve,2002-0724 || bugtraq,5556
2103 || NETBIOS SMB trans2open buffer overflow attempt || url,www.digitaldefense.net/labs/advisories/DDI-1013.txt || cve,2003-0201 || bugtraq,7294
2104 || ATTACK-RESPONSES rexec username too long response
2105 || IMAP authenticate literal overflow attempt || nessus,10292 || cve,1999-0042
2106 || IMAP lsub overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
2107 || IMAP create buffer overflow attempt || bugtraq,7446
2108 || POP3 CAPA overflow attempt
2109 || POP3 TOP overflow attempt
2110 || POP3 STAT overflow attempt
2111 || POP3 DELE overflow attempt
2112 || POP3 RSET overflow attempt
2113 || RSERVICES rexec username overflow attempt
2114 || RSERVICES rexec password overflow attempt
2115 || WEB-CGI album.pl access || bugtraq,7444
2116 || WEB-CGI chipcfg.cgi access || cve,2001-1341 || bugtraq,2767
2117 || WEB-IIS Battleaxe Forum login.asp access || cve,2003-0215 || bugtraq,7416
2118 || IMAP list overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
2119 || IMAP rename literal overflow attempt || nessus,10374 || cve,2000-0284 || bugtraq,1110
2120 || IMAP create literal buffer overflow attempt || bugtraq,7446
2121 || POP3 DELE negative arguement attempt || cve,2002-1539 || bugtraq,7445 || bugtraq,6053
2122 || POP3 UIDL negative arguement attempt || cve,2002-1539 || bugtraq,6053
2123 || ATTACK-RESPONSES Microsoft cmd.exe banner || nessus,11633
2124 || BACKDOOR Remote PC Access connection attempt || nessus,11673
2125 || FTP CWD Root directory transversal attempt || nessus,11677 || cve,2003-0392 || bugtraq,7674
2126 || MISC Microsoft PPTP Start Control Request buffer overflow attempt || cve,2002-1214 || bugtraq,5807
2127 || WEB-CGI ikonboard.cgi access || nessus,11605 || bugtraq,7361
2128 || WEB-CGI swsrv.cgi access || nessus,11608 || cve,2003-0217 || bugtraq,7510
2129 || WEB-IIS nsiislog.dll access || url,www.microsoft.com/technet/security/bulletin/ms03-018.mspx || nessus,11664 || cve,2003-0349 || bugtraq,8035
2130 || WEB-IIS IISProtect siteadmin.asp access || nessus,11662 || cve,2003-0377 || bugtraq,7675
2131 || WEB-IIS IISProtect access || nessus,11661
2132 || WEB-IIS Synchrologic Email Accelerator userid list access attempt || nessus,11657
2133 || WEB-IIS MS BizTalk server access || nessus,11638 || cve,2003-0118 || cve,2003-0117 || bugtraq,7470 || bugtraq,7469
2134 || WEB-IIS register.asp access || nessus,11621
2135 || WEB-MISC philboard.mdb access || nessus,11682
2136 || WEB-MISC philboard_admin.asp authentication bypass attempt || nessus,11675 || bugtraq,7739
2137 || WEB-MISC philboard_admin.asp access || nessus,11675 || bugtraq,7739
2138 || WEB-MISC logicworks.ini access || nessus,11639 || bugtraq,6996
2139 || WEB-MISC /*.shtml access || nessus,11604 || cve,2000-0683 || bugtraq,1517
2140 || WEB-PHP p-news.php access || nessus,11669
2141 || WEB-PHP shoutbox.php directory traversal attempt || nessus,11668
2142 || WEB-PHP shoutbox.php access || nessus,11668
2143 || WEB-PHP b2 cafelog gm-2-b2.php remote file include attempt || nessus,11667
2144 || WEB-PHP b2 cafelog gm-2-b2.php access || nessus,11667
2145 || WEB-PHP TextPortal admin.php default password admin attempt || nessus,11660 || bugtraq,7673
2146 || WEB-PHP TextPortal admin.php default password 12345 attempt || nessus,11660 || bugtraq,7673
2147 || WEB-PHP BLNews objects.inc.php4 remote file include attempt || nessus,11647 || cve,2003-0394 || bugtraq,7677
2148 || WEB-PHP BLNews objects.inc.php4 access || nessus,11647 || cve,2003-0394 || bugtraq,7677
2149 || WEB-PHP Turba status.php access || nessus,11646
2150 || WEB-PHP ttCMS header.php remote file include attempt || nessus,11636 || bugtraq,7625 || bugtraq,7543 || bugtraq,7542
2151 || WEB-PHP ttCMS header.php access || nessus,11636 || bugtraq,7625 || bugtraq,7543 || bugtraq,7542
2152 || WEB-PHP test.php access || nessus,11617
2153 || WEB-PHP autohtml.php directory traversal attempt || nessus,11630
2154 || WEB-PHP autohtml.php access || nessus,11630
2155 || WEB-PHP ttforum remote file include attempt || nessus,11615 || bugtraq,7543 || bugtraq,7542
2156 || WEB-MISC mod_gzip_status access || nessus,11685
2157 || WEB-IIS IISProtect globaladmin.asp access || nessus,11661
2158 || MISC BGP invalid length || url,sf.net/tracker/index.php?func=detail&aid=744523&group_id=53066&atid=469575
2159 || MISC BGP invalid type 0
2160 || VIRUS OUTBOUND .exe file attachment
2161 || VIRUS OUTBOUND .doc file attachment
2162 || VIRUS OUTBOUND .hta file attachment
2163 || VIRUS OUTBOUND .chm file attachment
2164 || VIRUS OUTBOUND .reg file attachment
2165 || VIRUS OUTBOUND .ini file attachment
2166 || VIRUS OUTBOUND .bat file attachment
2167 || VIRUS OUTBOUND .diz file attachment
2168 || VIRUS OUTBOUND .cpp file attachment
2169 || VIRUS OUTBOUND .dll file attachment
2170 || VIRUS OUTBOUND .vxd file attachment
2171 || VIRUS OUTBOUND .sys file attachment
2172 || VIRUS OUTBOUND .com file attachment
2173 || VIRUS OUTBOUND .hsq file attachment
2174 || NETBIOS SMB winreg access
2175 || NETBIOS SMB winreg unicode access
2176 || NETBIOS SMB startup folder access
2177 || NETBIOS SMB startup folder unicode access
2178 || FTP USER format string attempt || cve,2004-0277 || bugtraq,9800 || bugtraq,9600 || bugtraq,9402 || bugtraq,9262 || bugtraq,7776 || bugtraq,7474
2179 || FTP PASS format string attempt || bugtraq,9800 || bugtraq,9262 || bugtraq,7474
2180 || P2P BitTorrent announce request
2181 || P2P BitTorrent transfer
2182 || BACKDOOR typot trojan traffic
2183 || SMTP Content-Transfer-Encoding overflow attempt || url,www.cert.org/advisories/CA-2003-12.html || cve,2003-0161
2184 || RPC mountd TCP mount path overflow attempt || nessus,11800 || cve,2003-0252 || bugtraq,8179
2185 || RPC mountd UDP mount path overflow attempt || nessus,11800 || cve,2003-0252 || bugtraq,8179
2186 || BAD-TRAFFIC IP Proto 53 SWIPE || cve,2003-0567 || bugtraq,8211
2187 || BAD-TRAFFIC IP Proto 55 IP Mobility || cve,2003-0567 || bugtraq,8211
2188 || BAD-TRAFFIC IP Proto 77 Sun ND || cve,2003-0567 || bugtraq,8211
2189 || BAD-TRAFFIC IP Proto 103 PIM || cve,2003-0567 || bugtraq,8211
2190 || NETBIOS DCERPC invalid bind attempt
2191 || NETBIOS SMB DCERPC invalid bind attempt
2192 || NETBIOS DCERPC ISystemActivator bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-026.mspx || cve,2003-0352 || bugtraq,8205
2193 || NETBIOS SMB-DS DCERPC ISystemActivator bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-026.mspx || cve,2003-0352 || bugtraq,8205
2194 || WEB-CGI CSMailto.cgi access || nessus,11748 || cve,2002-0749 || bugtraq,6265 || bugtraq,4579
2195 || WEB-CGI alert.cgi access || nessus,11748 || cve,2002-0346 || bugtraq,4579 || bugtraq,4211
2196 || WEB-CGI catgy.cgi access || nessus,11748 || cve,2001-1212 || bugtraq,4579 || bugtraq,3714
2197 || WEB-CGI cvsview2.cgi access || nessus,11748 || cve,2003-0153 || bugtraq,5517 || bugtraq,4579
2198 || WEB-CGI cvslog.cgi access || nessus,11748 || cve,2003-0153 || bugtraq,5517 || bugtraq,4579
2199 || WEB-CGI multidiff.cgi access || nessus,11748 || cve,2003-0153 || bugtraq,5517 || bugtraq,4579
2200 || WEB-CGI dnewsweb.cgi access || nessus,11748 || cve,2000-0423 || bugtraq,4579 || bugtraq,1172
2201 || WEB-CGI download.cgi access || nessus,11748 || cve,1999-1377 || bugtraq,4579
2202 || WEB-CGI edit_action.cgi access || nessus,11748 || cve,2001-1196 || bugtraq,4579 || bugtraq,3698
2203 || WEB-CGI everythingform.cgi access || nessus,11748 || cve,2001-0023 || bugtraq,4579 || bugtraq,2101
2204 || WEB-CGI ezadmin.cgi access || nessus,11748 || cve,2002-0263 || bugtraq,4579 || bugtraq,4068
2205 || WEB-CGI ezboard.cgi access || nessus,11748 || cve,2002-0263 || bugtraq,4579 || bugtraq,4068
2206 || WEB-CGI ezman.cgi access || nessus,11748 || cve,2002-0263 || bugtraq,4579 || bugtraq,4068
2207 || WEB-CGI fileseek.cgi access || nessus,11748 || cve,2002-0611 || bugtraq,6784 || bugtraq,4579
2208 || WEB-CGI fom.cgi access || nessus,11748 || cve,2002-0230 || bugtraq,4579
2209 || WEB-CGI getdoc.cgi access || nessus,11748 || cve,2000-0288 || bugtraq,4579
2210 || WEB-CGI global.cgi access || nessus,11748 || cve,2000-0952 || bugtraq,4579
2211 || WEB-CGI guestserver.cgi access || nessus,11748 || cve,2001-0180 || bugtraq,4579
2212 || WEB-CGI imageFolio.cgi access || nessus,11748 || cve,2002-1334 || bugtraq,6265 || bugtraq,4579
2213 || WEB-CGI mailfile.cgi access || nessus,11748 || cve,2000-0977 || bugtraq,4579 || bugtraq,1807
2214 || WEB-CGI mailview.cgi access || nessus,11748 || cve,2000-0526 || bugtraq,4579 || bugtraq,1335
2215 || WEB-CGI nsManager.cgi access || nessus,11748 || cve,2000-1023 || bugtraq,4579 || bugtraq,1710
2216 || WEB-CGI readmail.cgi access || nessus,11748 || cve,2001-1283 || bugtraq,4579 || bugtraq,3427
2217 || WEB-CGI printmail.cgi access || nessus,11748 || cve,2001-1283 || bugtraq,4579 || bugtraq,3427
2218 || WEB-CGI service.cgi access || nessus,11748 || cve,2002-0346 || bugtraq,4579 || bugtraq,4211
2219 || WEB-CGI setpasswd.cgi access || nessus,11748 || cve,2001-0133 || bugtraq,4579 || bugtraq,2212
2220 || WEB-CGI simplestmail.cgi access || nessus,11748 || cve,2001-0022 || bugtraq,4579 || bugtraq,2106
2221 || WEB-CGI ws_mail.cgi access || nessus,11748 || cve,2001-1343 || bugtraq,4579 || bugtraq,2861
2222 || WEB-CGI nph-exploitscanget.cgi access || nessus,11740 || cve,2003-0434 || bugtraq,7912 || bugtraq,7911 || bugtraq,7910
2223 || WEB-CGI csNews.cgi access || nessus,11726 || cve,2002-0923 || bugtraq,4994
2224 || WEB-CGI psunami.cgi access || nessus,11750 || bugtraq,6607
2225 || WEB-CGI gozila.cgi access || nessus,11773
2226 || WEB-PHP pmachine remote file include attempt || nessus,11739 || bugtraq,7919
2227 || WEB-PHP forum_details.php access || nessus,11760 || bugtraq,7933
2228 || WEB-PHP phpMyAdmin db_details_importdocsql.php access || nessus,11761 || bugtraq,7965 || bugtraq,7962
2229 || WEB-PHP viewtopic.php access || nessus,11767 || cve,2003-0486 || bugtraq,7979
2230 || WEB-MISC NetGear router default password login attempt admin/password || nessus,11737
2231 || WEB-MISC register.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2232 || WEB-MISC ContentFilter.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2233 || WEB-MISC SFNofitication.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2234 || WEB-MISC TOP10.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2235 || WEB-MISC SpamExcp.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2236 || WEB-MISC spamrule.dll access || nessus,11747 || cve,2001-0958 || bugtraq,3327
2237 || WEB-MISC cgiWebupdate.exe access || nessus,11722 || cve,2001-1150 || bugtraq,3216
2238 || WEB-MISC WebLogic ConsoleHelp view source attempt || nessus,11724 || cve,2000-0682 || bugtraq,1518
2239 || WEB-MISC redirect.exe access || cve,2000-0401 || bugtraq,1256
2240 || WEB-MISC changepw.exe access || cve,2000-0401 || bugtraq,1256
2241 || WEB-MISC cwmail.exe access || nessus,11727 || cve,2002-0273 || bugtraq,4093
2242 || WEB-MISC ddicgi.exe access || nessus,11728 || cve,2000-0826 || bugtraq,1657
2243 || WEB-MISC ndcgi.exe access || nessus,11730 || cve,2001-0922
2244 || WEB-MISC VsSetCookie.exe access || nessus,11731 || cve,2002-0236 || bugtraq,3784
2245 || WEB-MISC Webnews.exe access || nessus,11732 || cve,2002-0290 || bugtraq,4124
2246 || WEB-MISC webadmin.dll access || nessus,11771
2247 || WEB-IIS UploadScript11.asp access || cve,2001-0938
2248 || WEB-IIS DirectoryListing.asp access || cve,2001-0938
2249 || WEB-IIS /pcadmin/login.asp access || nessus,11785 || bugtraq,8103
2250 || POP3 USER format string attempt || nessus,11742 || bugtraq,7667
2251 || NETBIOS DCERPC Remote Activation bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-039.mspx || cve,2003-0715 || cve,2003-0605 || cve,2003-0528 || bugtraq,8458 || bugtraq,8234
2252 || NETBIOS SMB-DS DCERPC Remote Activation bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-039.mspx || cve,2003-0715 || cve,2003-0605 || cve,2003-0528 || bugtraq,8458 || bugtraq,8234
2253 || SMTP XEXCH50 overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS03-046.mspx
2254 || SMTP XEXCH50 overflow with evasion attempt || url,www.microsoft.com/technet/security/bulletin/MS03-046.mspx
2255 || RPC sadmind query with root credentials attempt TCP
2256 || RPC sadmind query with root credentials attempt UDP
2257 || NETBIOS DCERPC Messenger Service buffer overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS03-043.mspx || cve,2003-0717 || bugtraq,8826
2258 || NETBIOS SMB-DS DCERPC Messenger Service buffer overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS03-043.mspx || cve,2003-0717 || bugtraq,8826
2259 || SMTP EXPN overflow attempt || cve,2003-0161 || cve,2002-1337 || bugtraq,7230 || bugtraq,6991
2260 || SMTP VRFY overflow attempt || cve,2003-0161 || cve,2002-1337 || bugtraq,7230 || bugtraq,6991
2261 || SMTP SEND FROM sendmail prescan too many addresses overflow || cve,2002-1337 || bugtraq,6991
2262 || SMTP SEND FROM sendmail prescan too long addresses overflow || cve,2003-0161 || bugtraq,7230
2263 || SMTP SAML FROM sendmail prescan too many addresses overflow || cve,2002-1337 || bugtraq,6991
2264 || SMTP SAML FROM sendmail prescan too long addresses overflow || cve,2003-0161 || bugtraq,7230
2265 || SMTP SOML FROM sendmail prescan too many addresses overflow || cve,2002-1337 || bugtraq,6991
2266 || SMTP SOML FROM sendmail prescan too long addresses overflow || cve,2003-0161 || bugtraq,7230
2267 || SMTP MAIL FROM sendmail prescan too many addresses overflow || cve,2002-1337 || bugtraq,6991
2268 || SMTP MAIL FROM sendmail prescan too long addresses overflow || cve,2003-0161 || bugtraq,7230
2269 || SMTP RCPT TO sendmail prescan too many addresses overflow || cve,2002-1337 || bugtraq,6991
2270 || SMTP RCPT TO sendmail prescan too long addresses overflow || cve,2003-0161 || bugtraq,7230
2271 || BACKDOOR FsSniffer connection attempt || nessus,11854
2272 || FTP LIST integer overflow attempt || cve,2003-0854 || cve,2003-0853 || bugtraq,8875
2273 || IMAP login brute force attempt
2274 || POP3 login brute force attempt
2275 || SMTP AUTH LOGON brute force attempt
2276 || WEB-MISC oracle portal demo access || nessus,11918
2277 || WEB-MISC PeopleSoft PeopleBooks psdoccgi access || cve,2003-0627 || cve,2003-0626 || bugtraq,9038 || bugtraq,9037
2278 || WEB-MISC negative Content-Length attempt || cve,2004-0095 || bugtraq,9576 || bugtraq,9476 || bugtraq,9098
2279 || WEB-PHP UpdateClasses.php access || bugtraq,9057
2280 || WEB-PHP Title.php access || bugtraq,9057
2281 || WEB-PHP Setup.php access || bugtraq,9057
2282 || WEB-PHP GlobalFunctions.php access || bugtraq,9057
2283 || WEB-PHP DatabaseFunctions.php access || bugtraq,9057
2284 || WEB-PHP rolis guestbook remote file include attempt || bugtraq,9057
2285 || WEB-PHP rolis guestbook access || bugtraq,9057
2286 || WEB-PHP friends.php access || bugtraq,9088
2287 || WEB-PHP Advanced Poll admin_comment.php access || nessus,11487 || bugtraq,8890
2288 || WEB-PHP Advanced Poll admin_edit.php access || nessus,11487 || bugtraq,8890
2289 || WEB-PHP Advanced Poll admin_embed.php access || nessus,11487 || bugtraq,8890
2290 || WEB-PHP Advanced Poll admin_help.php access || nessus,11487 || bugtraq,8890
2291 || WEB-PHP Advanced Poll admin_license.php access || nessus,11487 || bugtraq,8890
2292 || WEB-PHP Advanced Poll admin_logout.php access || nessus,11487 || bugtraq,8890
2293 || WEB-PHP Advanced Poll admin_password.php access || nessus,11487 || bugtraq,8890
2294 || WEB-PHP Advanced Poll admin_preview.php access || nessus,11487 || bugtraq,8890
2295 || WEB-PHP Advanced Poll admin_settings.php access || nessus,11487 || bugtraq,8890
2296 || WEB-PHP Advanced Poll admin_stats.php access || nessus,11487 || bugtraq,8890
2297 || WEB-PHP Advanced Poll admin_templates_misc.php access || nessus,11487 || bugtraq,8890
2298 || WEB-PHP Advanced Poll admin_templates.php access || nessus,11487 || bugtraq,8890
2299 || WEB-PHP Advanced Poll admin_tpl_misc_new.php access || nessus,11487 || bugtraq,8890
2300 || WEB-PHP Advanced Poll admin_tpl_new.php access || nessus,11487 || bugtraq,8890
2301 || WEB-PHP Advanced Poll booth.php access || nessus,11487 || bugtraq,8890
2302 || WEB-PHP Advanced Poll poll_ssi.php access || nessus,11487 || bugtraq,8890
2303 || WEB-PHP Advanced Poll popup.php access || nessus,11487 || bugtraq,8890
2304 || WEB-PHP files.inc.php access || bugtraq,8910
2305 || WEB-PHP chatbox.php access || bugtraq,8930
2306 || WEB-PHP gallery remote file include attempt || nessus,11876 || bugtraq,8814
2307 || WEB-PHP PayPal Storefront remote file include attemtp || nessus,11873 || bugtraq,8791
2308 || NETBIOS SMB DCERPC Workstation Service unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2309 || NETBIOS SMB DCERPC Workstation Service bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2310 || NETBIOS SMB-DS DCERPC Workstation Service unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2311 || NETBIOS SMB-DS DCERPC Workstation Service bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2312 || SHELLCODE x86 0x71FB7BAB NOOP
2313 || SHELLCODE x86 0x71FB7BAB NOOP unicode
2314 || SHELLCODE x86 0x90 NOOP unicode
2315 || NETBIOS DCERPC Workstation Service direct service bind attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2316 || NETBIOS DCERPC Workstation Service direct service access attempt || url,www.microsoft.com/technet/security/bulletin/MS03-049.mspx || cve,2003-0812 || bugtraq,9011
2317 || MISC CVS non-relative path error response || cve,2003-0977 || bugtraq,9178
2318 || MISC CVS non-relative path access attempt || cve,2003-0977 || bugtraq,9178
2319 || EXPLOIT ebola PASS overflow attempt || bugtraq,9156
2320 || EXPLOIT ebola USER overflow attempt || bugtraq,9156
2321 || WEB-IIS foxweb.exe access || nessus,11939
2322 || WEB-IIS foxweb.dll access || nessus,11939
2323 || WEB-CGI quickstore.cgi access || nessus,11975 || bugtraq,9282
2324 || WEB-IIS VP-ASP shopsearch.asp access || nessus,11942 || bugtraq,9134 || bugtraq,9133
2325 || WEB-IIS VP-ASP ShopDisplayProducts.asp access || nessus,11942 || bugtraq,9134 || bugtraq,9133
2326 || WEB-IIS sgdynamo.exe access || nessus,11955 || cve,2002-0375 || bugtraq,4720
2327 || WEB-MISC bsml.pl access || nessus,11973 || bugtraq,9311
2328 || WEB-PHP authentication_index.php access || nessus,11982 || cve,2004-0032
2329 || MS-SQL probe response overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-003.mspx || cve,2003-0903 || bugtraq,9407
2330 || IMAP auth overflow attempt || bugtraq,8861
2331 || WEB-PHP MatrikzGB privilege escalation attempt || bugtraq,8430
2332 || FTP MKDIR format string attempt || bugtraq,9262
2333 || FTP RENAME format string attempt || bugtraq,9262
2334 || FTP Yak! FTP server default account login attempt || bugtraq,9072
2335 || FTP RMD / attempt || bugtraq,9159
2336 || TFTP NULL command attempt || bugtraq,7575
2337 || TFTP PUT filename overflow attempt || cve,2003-0380 || bugtraq,8505 || bugtraq,7819
2338 || FTP LIST buffer overflow attempt || bugtraq,9675 || bugtraq,8486 || bugtraq,10181
2339 || TFTP NULL command attempt || bugtraq,7575
2340 || FTP SITE CHMOD overflow attempt || nessus,12037 || bugtraq,9483 || bugtraq,10181
2341 || WEB-PHP DCP-Portal remote file include attempt || bugtraq,6525
2342 || WEB-PHP DCP-Portal remote file include attempt || bugtraq,6525
2343 || FTP STOR overflow attempt || bugtraq,8668
2344 || FTP XCWD overflow attempt || bugtraq,8704
2345 || WEB-PHP PhpGedView search.php access || cve,2004-0032 || bugtraq,9369
2346 || WEB-PHP myPHPNuke chatheader.php access || bugtraq,6544
2347 || WEB-PHP myPHPNuke partner.php access || bugtraq,6544
2348 || NETBIOS SMB-DS DCERPC print spool bind attempt
2349 || NETBIOS SMB-DS DCERPC enumerate printers request attempt
2350 || NETBIOS DCERPC ISystemActivator bind accept || url,www.microsoft.com/technet/security/bulletin/MS03-026.mspx || cve,2003-0352 || bugtraq,8205
2351 || NETBIOS DCERPC ISystemActivator path overflow attempt little endian || url,www.microsoft.com/technet/security/bulletin/MS03-026.mspx || cve,2003-0352 || bugtraq,8205
2352 || NETBIOS DCERPC ISystemActivator path overflow attempt big endian || url,www.microsoft.com/technet/security/bulletin/MS03-026.mspx || cve,2003-0352 || bugtraq,8205
2353 || WEB-PHP IdeaBox cord.php file include || bugtraq,7488
2354 || WEB-PHP IdeaBox notification.php file include || bugtraq,7488
2355 || WEB-PHP Invision Board emailer.php file include || bugtraq,7204
2356 || WEB-PHP WebChat db_mysql.php file include || bugtraq,7000
2357 || WEB-PHP WebChat english.php file include || bugtraq,7000
2358 || WEB-PHP Typo3 translations.php file include || bugtraq,6984
2359 || WEB-PHP Invision Board ipchat.php file include || bugtraq,6976
2360 || WEB-PHP myphpPagetool pt_config.inc file include || bugtraq,6744
2361 || WEB-PHP news.php file include || bugtraq,6674
2362 || WEB-PHP YaBB SE packages.php file include || bugtraq,6663
2363 || WEB-PHP Cyboards default_header.php access || bugtraq,6597
2364 || WEB-PHP Cyboards options_form.php access || bugtraq,6597
2365 || WEB-PHP newsPHP Language file include attempt || bugtraq,8488
2366 || WEB-PHP PhpGedView PGV authentication_index.php base directory manipulation attempt || cve,2004-0030 || bugtraq,9368
2367 || WEB-PHP PhpGedView PGV functions.php base directory manipulation attempt || cve,2004-0030 || bugtraq,9368
2368 || WEB-PHP PhpGedView PGV config_gedcom.php base directory manipulation attempt || cve,2004-0030 || bugtraq,9368
2369 || WEB-MISC ISAPISkeleton.dll access || bugtraq,9516
2370 || WEB-MISC BugPort config.conf file access || bugtraq,9542
2371 || WEB-MISC Sample_showcode.html access || bugtraq,9555
2372 || WEB-PHP Photopost PHP Pro showphoto.php access || bugtraq,9557
2373 || FTP XMKD overflow attempt || bugtraq,7909
2374 || FTP NLST overflow attempt || bugtraq,9675 || bugtraq,7909 || bugtraq,10184
2375 || BACKDOOR DoomJuice file upload attempt || url,securityresponse.symantec.com/avcenter/venc/data/w32.hllw.doomjuice.html
2376 || EXPLOIT ISAKMP first payload certificate request length overflow attempt || cve,2004-0040 || bugtraq,9582
2377 || EXPLOIT ISAKMP second payload certificate request length overflow attempt || cve,2004-0040 || bugtraq,9582
2378 || EXPLOIT ISAKMP third payload certificate request length overflow attempt || cve,2004-0040 || bugtraq,9582
2379 || EXPLOIT ISAKMP forth payload certificate request length overflow attempt || cve,2004-0040 || bugtraq,9582
2380 || EXPLOIT ISAKMP fifth payload certificate request length overflow attempt || cve,2004-0040 || bugtraq,9582
2381 || WEB-MISC schema overflow attempt || cve,2004-0039 || bugtraq,9581
2382 || NETBIOS SMB NTLMSSP invalid mechtype attempt || nessus,12052 || cve,2003-0818 || bugtraq,9635 || bugtraq,9633
2383 || NETBIOS SMB-DS DCERPC NTLMSSP invalid mechtype attempt || nessus,12052 || cve,2003-0818 || bugtraq,9635 || bugtraq,9633
2384 || NETBIOS SMB NTLMSSP invalid mechlistMIC attempt || nessus,12054 || nessus,12052 || cve,2003-0818 || bugtraq,9635 || bugtraq,9633
2385 || NETBIOS SMB-DS DCERPC NTLMSSP invalid mechlistMIC attempt || nessus,12054 || nessus,12052 || cve,2003-0818 || bugtraq,9635 || bugtraq,9633
2386 || WEB-IIS NTLM ASN.1 vulnerability scan attempt || nessus,12055 || nessus,12052 || cve,2003-0818 || bugtraq,9635 || bugtraq,9633
2387 || WEB-CGI view_broadcast.cgi access || cve,2003-0422 || bugtraq,8257
2388 || WEB-CGI streaming server view_broadcast.cgi access || cve,2003-0422 || bugtraq,8257
2389 || FTP RNTO overflow attempt || cve,2003-0466 || bugtraq,8315
2390 || FTP STOU overflow attempt || cve,2003-0466 || bugtraq,8315
2391 || FTP APPE overflow attempt || cve,2003-0466 || bugtraq,8315
2392 || FTP RETR overflow attempt || cve,2003-0466 || bugtraq,8315
2393 || WEB-PHP /_admin access || nessus,12032 || bugtraq,9537
2394 || WEB-MISC Compaq web-based management agent denial of service attempt || bugtraq,8014
2395 || WEB-MISC InteractiveQuery.jsp access || cve,2003-0624 || bugtraq,8938
2396 || WEB-CGI CCBill whereami.cgi arbitrary command execution attempt || bugtraq,8095
2397 || WEB-CGI CCBill whereami.cgi access || bugtraq,8095
2398 || WEB-PHP WAnewsletter newsletter.php file include attempt || bugtraq,6965
2399 || WEB-PHP WAnewsletter db_type.php access || bugtraq,6964
2400 || WEB-MISC edittag.pl access || bugtraq,6675
2401 || NETBIOS SMB Session Setup AndX request username overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040226.html || bugtraq,9752
2402 || NETBIOS SMB-DS Session Setup AndX request username overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040226.html || bugtraq,9752
2403 || NETBIOS SMB Session Setup AndX request unicode username overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040226.html || bugtraq,9752
2404 || NETBIOS SMB-DS Session Setup AndX request unicode username overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040226.html || bugtraq,9752
2405 || WEB-PHP phptest.php access || bugtraq,9737
2406 || TELNET APC SmartSlot default admin account attempt || bugtraq,9681
2407 || WEB-MISC util.pl access || bugtraq,9748
2408 || WEB-MISC Invision Power Board search.pl access || bugtraq,9766
2409 || POP3 APOP USER overflow attempt || bugtraq,9794
2410 || WEB-PHP IGeneric Free Shopping Cart page.php access || bugtraq,9773
2411 || WEB-MISC Real Server DESCRIBE buffer overflow attempt || url,www.service.real.com/help/faq/security/rootexploit091103.html || bugtraq,8476
2412 || ATTACK-RESPONSES successful cross site scripting forced download attempt
2413 || EXPLOIT ISAKMP delete hash with empty hash attempt || cve,2004-0164 || bugtraq,CAN-2004-0164 || bugtraq,9417 || bugtraq,9416
2414 || EXPLOIT ISAKMP initial contact notification without SPI attempt || cve,2004-0164 || bugtraq,CAN-2004-0164 || bugtraq,9417 || bugtraq,9416
2415 || EXPLOIT ISAKMP second payload initial contact notification without SPI attempt || cve,2004-0164 || bugtraq,CAN-2004-0164 || bugtraq,9417 || bugtraq,9416
2416 || FTP invalid MDTM command attempt
2417 || FTP format string attempt
2418 || MISC MS Terminal Server no encryption session initiation attmept || url,www.microsoft.com/technet/security/bulletin/MS01-052.mspx
2419 || MULTIMEDIA realplayer .ram playlist download attempt
2420 || MULTIMEDIA realplayer .rmp playlist download attempt
2421 || MULTIMEDIA realplayer .smi playlist download attempt
2422 || MULTIMEDIA realplayer .rt playlist download attempt
2423 || MULTIMEDIA realplayer .rp playlist download attempt
2424 || NNTP sendsys overflow attempt || cve,2004-00045 || bugtraq,9382
2425 || NNTP senduuname overflow attempt || cve,2004-00045 || bugtraq,9382
2426 || NNTP version overflow attempt || cve,2004-00045 || bugtraq,9382
2427 || NNTP checkgroups overflow attempt || cve,2004-00045 || bugtraq,9382
2428 || NNTP ihave overflow attempt || cve,2004-00045 || bugtraq,9382
2429 || NNTP sendme overflow attempt || cve,2004-00045 || bugtraq,9382
2430 || NNTP newgroup overflow attempt || cve,2004-00045 || bugtraq,9382
2431 || NNTP rmgroup overflow attempt || cve,2004-00045 || bugtraq,9382
2432 || NNTP article post without path attempt
2433 || WEB-CGI MDaemon form2raw.cgi overflow attempt || bugtraq,9317
2434 || WEB-CGI MDaemon form2raw.cgi access || bugtraq,9317
2435 || WEB-CLIENT Microsoft emf metafile access || bugtraq,9707
2436 || WEB-CLIENT Microsoft wmf metafile access || bugtraq,9707
2437 || WEB-CLIENT RealPlayer arbitrary javascript command attempt || cve,2003-0726 || bugtraq,9738 || bugtraq,8453
2438 || WEB-CLIENT RealPlayer playlist file URL overflow attempt || bugtraq,9579
2439 || WEB-CLIENT RealPlayer playlist http URL overflow attempt || bugtraq,9579
2440 || WEB-CLIENT RealPlayer playlist rtsp URL overflow attempt || bugtraq,9579
2441 || WEB-MISC NetObserve authentication bypass attempt || bugtraq,9319
2442 || WEB-MISC Quicktime User-Agent buffer overflow attempt || cve,2004-0169 || bugtraq,9735
2443 || EXPLOIT ICQ SRV_MULTI/SRV_META_USER first name overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040318.html
2444 || EXPLOIT ICQ SRV_MULTI/SRV_META_USER first name overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040318.html
2445 || EXPLOIT ICQ SRV_MULTI/SRV_META_USER last name overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040318.html
2446 || EXPLOIT ICQ SRV_MULTI/SRV_META_USER email overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040318.html
2447 || WEB-MISC ServletManager access || nessus,12122 || cve,2001-1195 || bugtraq,3697
2448 || WEB-MISC setinfo.hts access || nessus,12120 || bugtraq,9973
2449 || FTP ALLO overflow attempt || bugtraq,9953
2450 || CHAT Yahoo IM successful logon
2451 || CHAT Yahoo IM voicechat
2452 || CHAT Yahoo IM ping
2453 || CHAT Yahoo IM conference invitation
2454 || CHAT Yahoo IM conference logon success
2455 || CHAT Yahoo IM conference message
2456 || CHAT Yahoo IM file transfer request
2457 || CHAT Yahoo IM message
2458 || CHAT Yahoo IM successful chat join
2459 || CHAT Yahoo IM webcam offer invitation
2460 || CHAT Yahoo IM webcam request
2461 || CHAT Yahoo IM webcam watch
2462 || EXPLOIT IGMP IGAP account overflow attempt || cve,2004-0367 || cve,2004-0176 || cve, CAN-2004-0367 || bugtraq,9952
2463 || EXPLOIT IGMP IGAP message overflow attempt || cve,2004-0367 || cve,2004-0176 || cve, CAN-2004-0367 || bugtraq,9952
2464 || EXPLOIT EIGRP prefix length overflow attempt || cve,2004-0367 || cve,2004-0176 || cve, CAN-2004-0367 || bugtraq,9952
2465 || NETBIOS SMB-DS IPC$ share access
2466 || NETBIOS SMB-DS IPC$ share unicode access
2467 || NETBIOS SMB D$ share unicode access
2468 || NETBIOS SMB-DS D$ share access
2469 || NETBIOS SMB-DS D$ share unicode access
2470 || NETBIOS SMB C$ share unicode access
2471 || NETBIOS SMB-DS C$ share access
2472 || NETBIOS SMB-DS C$ share unicode access
2473 || NETBIOS SMB ADMIN$ share unicode access
2474 || NETBIOS SMB-DS ADMIN$ share access
2475 || NETBIOS SMB-DS ADMIN$ share unicode access
2476 || NETBIOS SMB-DS Create AndX Request winreg attempt
2477 || NETBIOS SMB-DS Create AndX Request winreg unicode attempt
2478 || NETBIOS SMB-DS DCERPC bind winreg attempt
2479 || NETBIOS SMB-DS DCERPC bind winreg unicode attempt
2480 || NETBIOS SMB-DS DCERPC shutdown unicode attempt
2481 || NETBIOS SMB-DS DCERPC shutdown unicode little endian attempt
2482 || NETBIOS SMB-DS DCERPC shutdown attempt
2483 || NETBIOS SMB-DS DCERPC shutdown little endian attempt
2484 || WEB-MISC source.jsp access || nessus,12119
2485 || WEB-CLIENT Nortan antivirus sysmspam.dll load attempt || cve,2004-0363 || bugtraq,9916
2486 || DOS ISAKMP invalid identification payload attempt || cve,2004-0184 || bugtraq,10004
2487 || SMTP WinZip MIME content-type buffer overflow || bugtraq,9758
2488 || SMTP WinZip MIME content-disposition buffer overflow || bugtraq,9758
2489 || EXPLOIT esignal STREAMQUOTE buffer overflow attempt || bugtraq,9978
2490 || EXPLOIT esignal SNAPQUOTE buffer overflow attempt || bugtraq,9978
2491 || NETBIOS SMB-DS DCERPC ISystemActivator unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2492 || NETBIOS SMB DCERPC ISystemActivator bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2493 || NETBIOS SMB DCERPC ISystemActivator unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2494 || NETBIOS DCEPRC ORPCThis request flood attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2495 || NETBIOS SMB DCEPRC ORPCThis request flood attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2496 || NETBIOS SMB-DS DCEPRC ORPCThis request flood attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0813 || bugtraq,8811
2497 || IMAP SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2498 || IMAP SSLv3 invalid timestamp attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2499 || MISC LDAP SSLv3 invalid timestamp attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2500 || MISC LDAP SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx
2501 || POP3 SSLv3 invalid timestamp attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2502 || POP3 SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2503 || SMTP SSLv3 invalid timestamp attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2504 || SMTP SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2505 || WEB-MISC SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2506 || WEB-MISC SSLv3 invalid timestamp attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2507 || NETBIOS DCERPC LSASS bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2508 || NETBIOS DCERPC LSASS DsRolerUpgradeDownlevelServer Exploit attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2509 || NETBIOS SMB DCERPC LSASS unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2510 || NETBIOS SMB DCERPC LSASS bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2511 || NETBIOS SMB DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2512 || NETBIOS SMB-DS DCERPC LSASS bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2513 || NETBIOS SMB-DS DCERPC LSASS unicode bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2514 || NETBIOS SMB-DS DCERPC LSASS DsRolerUpgradeDownlevelServer exploit attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2515 || WEB-MISC PCT Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2516 || MISC LDAP PCT Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2517 || IMAP PCT Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2518 || PO3 PCT Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2519 || SMTP Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2520 || WEB-MISC SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2521 || WEB-MISC SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2522 || WEB-MISC SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2523 || DOS BGP spoofed connection reset attempt || url,www.uniras.gov.uk/vuls/2004/236929/index.htm || cve,2004-0230 || bugtraq,10183
2524 || NETBIOS DCERPC LSASS direct bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2525 || NETBIOS SMB DCERPC LSASS direct bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2526 || NETBIOS SMB-DS DCERPC LSASS direct bind attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0533 || bugtraq,10108
2527 || SMTP STARTTLS attempt
2528 || SMTP TLS PCT Client_Hello overflow attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2003-0719 || bugtraq,10116
2529 || IMAP SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2530 || IMAP SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2531 || IMAP SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2532 || MISC LDAP SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2533 || MISC LDAP SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2534 || MISC LDAP SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2535 || POP3 SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2536 || POP3 SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2537 || POP3 SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2538 || SMTP SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2539 || SMTP SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2540 || SMTP SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2541 || SMTP TLS SSLv3 invalid data version attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120 || bugtraq,10115
2542 || SMTP TLS SSLv3 Client_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2543 || SMTP TLS SSLv3 Server_Hello request || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2544 || SMTP TLS SSLv3 invalid Client_Hello attempt || url,www.microsoft.com/technet/security/bulletin/MS04-011.mspx || cve,2004-0120
2545 || EXPLOIT AFP FPLoginExt username buffer overflow attempt || url,www.atstake.com/research/advisories/2004/a050304-1.txt || cve,2004-0430 || bugtraq,10271
2546 || FTP MDTM overflow attempt || bugtraq,9751
2547 || MISC HP Web JetAdmin remote file upload attempt || bugtraq,9978
2548 || MISC HP Web JetAdmin setinfo access || bugtraq,9972
2549 || MISC HP Web JetAdmin file write attempt || bugtraq,9973
2550 || EXPLOIT winamp XM module name overflow || url,www.nextgenss.com/advisories/winampheap.txt
2551 || EXPLOIT Oracle Web Cache GET overflow attempt || cve,2004-0385 || bugtraq,9868
2552 || EXPLOIT Oracle Web Cache HEAD overflow attempt || cve,2004-0385 || bugtraq,9868
2553 || EXPLOIT Oracle Web Cache PUT overflow attempt || cve,2004-0385 || bugtraq,9868
2554 || EXPLOIT Oracle Web Cache POST overflow attempt || cve,2004-0385 || bugtraq,9868
2555 || EXPLOIT Oracle Web Cache TRACE overflow attempt || cve,2004-0385 || bugtraq,9868
2556 || EXPLOIT Oracle Web Cache DELETE overflow attempt || cve,2004-0385 || bugtraq,9868
2557 || EXPLOIT Oracle Web Cache LOCK overflow attempt || cve,2004-0385 || bugtraq,9868
2558 || EXPLOIT Oracle Web Cache MKCOL overflow attempt || cve,2004-0385 || bugtraq,9868
2559 || EXPLOIT Oracle Web Cache COPY overflow attempt || cve,2004-0385 || bugtraq,9868
2560 || EXPLOIT Oracle Web Cache MOVE overflow attempt || cve,2004-0385 || bugtraq,9868
2561 || MISC rsync backup-dir directory traversal attempt || cve,2004-0426 || bugtraq,10247
2562 || WEB-MISC McAfee ePO file upload attempt || cve,2004-0038 || bugtraq,10200
2563 || NETBIOS NS lookup response name overflow attempt || url,www.eeye.com/html/Research/Advisories/AD20040512A.html || cve,2004-0445 || cve,2004-0444 || bugtraq,10334 || bugtraq,10333
2564 || NETBIOS NS lookup short response attempt || url,www.eeye.com/html/Research/Advisories/AD20040512C.html || cve,2004-0445 || cve,2004-0444 || bugtraq,10335 || bugtraq,10334
2565 || WEB-PHP modules.php access || bugtraq,9879
2566 || WEB-PHP PHPBB viewforum.php access || bugtraq,9866
2567 || WEB-CGI Emumail init.emu access || bugtraq,9861
2568 || WEB-CGI Emumail emumail.fcgi access || bugtraq,9861
2569 || WEB-MISC cPanel resetpass access || bugtraq,9848
2570 || WEB-MISC Invalid HTTP Version String || nessus,11593 || bugtraq,9809
2571 || WEB-IIS SmarterTools SmarterMail frmGetAttachment.aspx access || bugtraq,9805
2572 || WEB-IIS SmarterTools SmarterMail login.aspx buffer overflow attempt || bugtraq,9805
2573 || WEB-IIS SmarterTools SmarterMail frmCompose.asp access || bugtraq,9805
2574 || FTP RETR format string attempt || bugtraq,9800
2575 || WEB-PHP Opt-X header.php remote file include attempt || bugtraq,9732
2576 || ORACLE generate_replication_support prefix overflow attempt
2577 || WEB-CLIENT local resource redirection attempt || url,www.kb.cert.org/vuls/id/713878 || cve,2004-0549