Policy Knowledge

 

The followings are the list of main security policies according to the types. Click the name of a security policy to view the details.

 

 

             1.  Backdoor

             2.  DOS

             3.  Scan

             4.  virus

             5.  Database

             6.  IP

             7.  TCP

             8.  UDP

             9.  ICMP

             10.  FTP

             11.  TFTP

             12.  DNS

             13.  HTTP

             14.  SMTP

             15.  MSN

             16.  SNMP

             17. Telnet

             18.  Finger

Backdoor

FINGER_CDK

FTP_ADMwOrm_retrieval

HTTP_Sensepost.exe command shell attempt

ICMP_BlackHole

ICMP_Ice Backdoor

TCP_ACKcmdC trojan scan

TCP_Amanda 2.0 connection established

TCP_Asylum 0.1 connection established

TCP_Asylum 0.1 connection request

TCP_BackConstruction 2.1 Client FTP Open Request

TCP_BackConstruction 2.1 Connection

TCP_BackConstruction 2.1 Server FTP Open Reply

TCP_BackContruction.2.1

TCP_BackOrifice 2000 Inbound Traffic

TCP_CDK

TCP_Crazzy Net 5.0 connection established

TCP_Dagger_1.4.0

TCP_Dagger_1.4.0_client_connect

TCP_Doly 1.5 server response

TCP_Doly.2.0

TCP_DonaldDick.1.53_traffic

TCP_DoomJuice file upload attempt

TCP_Erazer_Lite_Backdoor

TCP_FsSniffer connection attempt

TCP_GateCrasher

TCP_Girl

TCP_Gray_Pigeon_Backdoor

TCP_Hack_a_tack attempt

TCP_HackAttack.1.20

TCP_Infector 1.6 Client to Server Connection Request

TCP_Infector.1.6_server_to_client

TCP_Infector.1.x

TCP_Insane Network 4.0 connection established

TCP_Insane Network 4.0 connection established port 63536

TCP_Mydoom.a backdoor upload/execute attempt

TCP_NetBus Pro 2.0 connection established

TCP_NetBus Pro 2.0 connection request

TCP_Netbus_Backdoor

TCP_Netbus_getinfo_Backdoor

TCP_NetMetro

TCP_NetMetro_Incoming_Traffic

TCP_NetMetro_Incoming_Traffic

TCP_NetSphere

TCP_Netsphere.1.31.337

TCP_PhaseZero

TCP_psyBNC_Backdoor

TCP_QAZ_Worm_Backdoor

TCP_Remote PC Access connection attempt

TCP_RUX the Tick get system directory attempt

TCP_RUX the Tick get windows directory attempt

TCP_RUX the Tick upload/execute arbitrary file attempt

TCP_SatansBackdoor.2.0.Beta

TCP_SubSeven 2.1 Gold server connection response

TCP_Subseven 2.2

TCP_Subseven DEFCON8 2.1 access

TCP_Trinity connection attempt

TCP_Vampire 1.2 connection confirmation

TCP_Vampire 1.2 connection request

TCP_WinCrash.1.0_Server

TCP_WinEggDropShell_Backdoor

TCP_Y3KRAT 1.5 Connect

TCP_Y3KRAT 1.5 Connect Client Response

TCP_Y3KRAT 1.5 Connection confirmation

TELNET_Attempt

TELNET_HidePak backdoor attempt

TELNET_HideSource backdoor attempt

TELNET_MISC Linux rootkit attempt

TELNET_MISC Linux rootkit attempt lrkr0x

TELNET_MISC Linux rootkit satori attempt

TELNET_MISC r00t attempt

TELNET_MISC rewt attempt

TELNET_MISC sm4ck attempt

TELNET_MISC Solaris 2.5 attempt

TELNET_w00w00 attempt

UDP_BackOrifice

UDP_DeepThroat.3.1_Activation_Server

UDP_DeepThroat.3.1_Cached_Password_Request

UDP_DeepThroat.3.1_Close _CDROM

UDP_DeepThroat.3.1_Close_Port_Scan

UDP_DeepThroat.3.1_Create_Directory

UDP_DeepThroat.3.1_Delete_File

UDP_DeepThroat.3.1_Display_Visual_Window

UDP_DeepThroat.3.1_Driver_Information

UDP_DeepThroat.3.1_Email

UDP_DeepThroat.3.1_Emial

UDP_DeepThroat.3.1_Freeze_Mouse

UDP_DeepThroat.3.1_FTP_Port_Changed

UDP_DeepThroat.3.1_FTP_Server_Port

UDP_DeepThroat.3.1_FTP_Status

UDP_DeepThroat.3.1_Get_Network_Documents

UDP_DeepThroat.3.1_Graphic_Display

UDP_DeepThroat.3.1_Hide_Or_Show_Clock

UDP_DeepThroat.3.1_Hide_Or_Show_Start_Button

UDP_DeepThroat.3.1_Hide_Or_Show_The_Desktop

UDP_DeepThroat.3.1_Hide_Program

UDP_DeepThroat.3.1_Hide_Window

UDP_DeepThroat.3.1_HUP_modem

UDP_DeepThroat.3.1_ICQ_Warning _OFF

UDP_DeepThroat.3.1_ICQ_Warning_ON

UDP_DeepThroat.3.1_Kill_Window

UDP_DeepThroat.3.1_Login

UDP_DeepThroat.3.1_Monitor_On_Or_Off

UDP_DeepThroat.3.1_Mouse_Button_Exchange

UDP_DeepThroat.3.1_Normal_Programe

UDP_DeepThroat.3.1_Open _CDROM

UDP_DeepThroat.3.1_Password_Changed

UDP_DeepThroat.3.1_RAS

UDP_DeepThroat.3.1_rehash

UDP_DeepThroat.3.1_Remote_Service_Password

UDP_DeepThroat.3.1_Resolution_Changed

UDP_DeepThroat.3.1_Search_For_Documents

UDP_DeepThroat.3.1_Search_For_Documents

UDP_DeepThroat.3.1_Send_Data

UDP_DeepThroat.3.1_Send_Data_to_Server

UDP_DeepThroat.3.1_Send_Text to the Window

UDP_DeepThroat.3.1_Send_URL

UDP_DeepThroat.3.1_Service_rehash

UDP_DeepThroat.3.1_Service_Status

UDP_DeepThroat.3.1_Service_Status

UDP_DeepThroat.3.1_Show_All_Window

UDP_DeepThroat.3.1_Show_Answer_Dialog

UDP_DeepThroat.3.1_Show_Dialog_Box

UDP_DeepThroat.3.1_Show_Process

UDP_DeepThroat.3.1_Show_Window

UDP_DeepThroat.3.1_Show_Window

UDP_DeepThroat.3.1_Sounds

UDP_DeepThroat.3.1_System_Information

UDP_DeepThroat.3.1_Window_Title_Change

UDP_DeepThroat.3.1CTRL_ALT_DEL

UDP_DeepThroat_Backdoor

UDP_Green_Trojan

UDP_Matrix 2.0 Client connect

UDP_Matrix 2.0 Server access

UDP_Matrix.2.0_Customers_Connection

UDP_win_trin00 connection attempt

                                                                                                                                              Top

DOS

HTTP_DOS Cisco attempt

ICMP_DDOS _TFN client command LE

ICMP_DDOS Stacheldraht agent_>handler skillz

ICMP_DDOS Stacheldraht client check gag

ICMP_DDOS Stacheldraht client check skillz

ICMP_DDOS Stacheldraht client spoofworks

ICMP_DDOS Stacheldraht gag server response

ICMP_DDOS Stacheldraht handler_>agent ficken

ICMP_DDOS Stacheldraht handler_>agent niggahbitch

ICMP_DDOS Stacheldraht server response

ICMP_DDOS Stacheldraht server spoof

ICMP_DDOS TFN client command BE

ICMP_DDOS TFN Probe

ICMP_DDOS TFN server response

ICMP_DDOS tfn2k icmp possible communication

ICMP_DOS ath

IGMP_DOS attack

TCP_DDOS mstream handler to client

TCP_DDOS shaft client login to handler

TCP_DDOS Trin00 Attacker to Master default mdie password

TCP_DDOS Trin00 Attacker to Master default password

TCP_DDOS Trin00 Attacker to Master default startup password

TCP_DOS iParty DOS attempt

TCP_DOS Real Audio Server

TCP_DOS Real Server template.html

UDP_DDOS mstream agent pong to handler

UDP_DDOS mstream agent to handler

UDP_DDOS mstream handler ping to agent

UDP_DDOS mstream handler to agent

UDP_DDOS shaft agent to handler

UDP_DDOS shaft handler to agent

UDP_DDOS Trin00 Daemon to Master *HELLO* message detected

UDP_DDOS Trin00 Daemon to Master message detected

UDP_DDOS Trin00 Daemon to Master PONG message detected

UDP_DDOS Trin00 Master to Daemon default password attempt

UDP_DOS Ascend Route

UDP_DOS ISAKMP invalid identification payload attempt

UDP_DOS squid WCCP I_SEE_YOU message overflow attempt

                                                                                                                                              Top

Scan

DNS_Authors_Detection

DNS_BIND_Version_Detection

ECHO_Cybercop_Scan

FINGER_Cybercop_Query

FTP_ADM_Scan

FTP_ISS_Scan

FTP_Piss_Scan

FTP_Saint_Scan

HTTP_commerce_request

HTTP_sendtemp_request

HTTP_tstisapi_request

HTTP_webspirs_request

ICMP_Cybercop_Scan

ICMP_Hoppa_Scan

ICMP_ISS_Scan

ICMP_Macintosh_Ping

ICMP_PING Sniffer Pro/NetXRay network scan

ICMP_Pinger_Ping

ICMP_PingO_MeterWindows_Ping

ICMP_Pingseer_ping

ICMP_TFN_Detection

ICMP_TJPingPro1.1Build_ping

ICMP_Venus_Scan

ICMP_WhatsupGold_Ping

SMTP_Cybercop_Scan_EHLO

SMTP_Cybercop_Scan_EXPN

TCP_AckCmd

TCP_Cybercop_Operating_System _Detection _PA12

TCP_Cybercop_Operating_System _Detection _SFU12

TCP_Cybercop_Operating_System _Detection_SF12

TCP_IPeye_syn_Scan

TCP_myscan

TCP_NMAP_Operating_System _Detection_SFPU

TCP_nmap_TCP

TCP_NULL

TCP_Operating_System _Detection _SF

TCP_Queso_Operating_System _Detection_S12

TCP_synscan_microsoft

TCP_synscan_portscan

TCP_trojan_hack_a_tack_probe

TCP_Wingate_Sacan

TCP_XMAS

UDP_Webtrends_Scan

                                                                                                                                              Top

Virus

Virus_Codeblue

Virus_Codered

Virus_Nimda_Attack

Virus_Nimda_Mailrecv

Virus_Nimda_MailSend

Virus_Nimda_Web

Virus_OpenSSL Worm traffic

Virus_Ramen worm

Virus_slapper worm admin traffic

Virus_Worm.Win32.DiskGen.cy

Virus_WTC

                                                                                                                                              Top

Database

MS_SQL injection attacks

MS_SQL raiserror possible buffer overflow

MS_SQL sa brute force failed login attempt

MS_SQL shellcode attempt

MS_SQL sp_adduser database user creation

MS_SQL sp_delete_alert log file deletion

MS_SQL sp_password password change

MS_SQL sp_start_job _program execution

MS_SQL xp_cmdshell program execution

MS_SQL xp_cmdshell program execution 445

MS_SQL xp_displayparamstmt possible buffer overflow

MS_SQL xp_enumresultset possible buffer overflow

MS_SQL xp_peekqueue possible buffer overflow

MS_SQL xp_printstatements possible buffer overflow

MS_SQL xp_proxiedmetadata possible buffer overflow

MS_SQL xp_reg* registry access

MS_SQL xp_setsqlsecurity possible buffer overflow

MS_SQL xp_showcolv possible buffer overflow

MS_SQL xp_sprintf possible buffer overflow

MS_SQL xp_updatecolvbm possible buffer overflow

                                                                                                                                              Top

IP

SHELLCODE AIX NOOP

SHELLCODE Digital UNIX NOOP

SHELLCODE HP_UX NOOP

SHELLCODE Linux shellcode

SHELLCODE SGI NOOP

SHELLCODE sparc NOOP

SHELLCODE sparc setuid 0

SHELLCODE x86 0x71FB7BAB NOOP

SHELLCODE x86 0x71FB7BAB NOOP unicode

SHELLCODE x86 0x90 unicode NOOP

SHELLCODE x86 0xEB0C NOOP

SHELLCODE x86 inc ebx NOOP

SHELLCODE x86 NOOP

SHELLCODE x86 stealth NOOP

                                                                                                                                              Top

TCP

MYSQL 4.0 root login attempt

MYSQL root login attempt

MYSQL show databases attempt

TCP_Alcatel PABX 4400 connection attempt

TCP_Connection Closed MSG from Port 80

TCP_CVS double free exploit attempt response

TCP_CVS invalid directory response

TCP_CVS invalid module response

TCP_CVS invalid repository response

TCP_CVS invalid user authentication response

TCP_CVS missing cvsroot response

TCP_CVS non_relative path error response

TCP_EXPLOIT AIX pdnsd overflow

TCP_EXPLOIT cachefsd buffer overflow attempt

TCP_EXPLOIT CDE dtspcd exploit attempt

TCP_EXPLOIT CHAT IRC Ettercap parse overflow attempt

TCP_EXPLOIT CHAT IRC topic overflow

TCP_EXPLOIT delegate proxy overflow

TCP_EXPLOIT ebola PASS overflow attempt

TCP_EXPLOIT ebola USER overflow attempt

TCP_EXPLOIT gobbles SSH exploit attempt

TCP_EXPLOIT kadmind buffer overflow attempt

TCP_EXPLOIT LPD dvips remote command execution attempt

TCP_EXPLOIT LPRng overflow

TCP_EXPLOIT MDBMS overflow

TCP_EXPLOIT nlps x86 Solaris overflow

TCP_EXPLOIT Redhat 7.0 lprd overflow

TCP_EXPLOIT rwhoisd format string attempt

TCP_EXPLOIT SCO calserver overflow

TCP_EXPLOIT ssh CRC32 overflow

TCP_EXPLOIT ssh CRC32 overflow /bin/sh

TCP_EXPLOIT ssh CRC32 overflow NOOP

TCP_EXPLOIT SSH server banner overflow

TCP_EXPLOIT VQServer admin

TCP_EXPLOIT x86 Linux samba overflow

TCP_gopher proxy

TCP_ICQ access

TCP_ICQ forced user addition

TCP_Insecure TIMBUKTU Password

TCP_IRC channel join

TCP_IRC DCC chat request

TCP_IRC DCC file transfer request

TCP_IRC dns request

TCP_IRC dns response

TCP_IRC message

TCP_IRC nick change

TCP_Land

TCP_Messenger File Transfer Receive Request

TCP_MS Terminal Server no encryption session initiation attempt

TCP_MS Terminal server request

TCP_MS Terminal server request RDP

TCP_PCAnywhere Attempted Administrator Login

TCP_PCAnywhere Failed Login

TCP_psyBNC access

TCP_snmpxdmid_overflow

TCP_Yahoo IM conference invitation

TCP_Yahoo IM conference logon success

TCP_Yahoo IM conference message

TCP_Yahoo IM conference offer invitation

TCP_Yahoo IM conference request

TCP_Yahoo IM conference watch

TCP_Yahoo IM ping

TCP_Yahoo IM successful chat join

TCP_Yahoo IM successful logon

TCP_Yahoo IM voicechat

TCP_Yahoo Messenger File Transfer Initiation Request

TCP_Yahoo Messenger Message

WEB_CGI story.pl arbitrary file read attempt

WEB_CGI streaming server parse_xml.cgi access

WEB_CGI streaming server view_broadcast.cgi access

                                                                                                                                              Top

UDP

UDP_AFS access

UDP_EXPLOIT ntalkd x86 Linux overflow

UDP_EXPLOIT x86 Linux mountd overflow

UDP_SQL_Ping

UDP_TraceRoute

UDP_UPnP malformed advertisement

UDP_xdmcp info query

UDP_xdmcp query

                                                                                                                                              Top

ICMP

ICMP_digital island bandwidth query

ICMP_IRDP router advertisement

ICMP_IRDP router selection

ICMP_ISS Pinger

ICMP_L3retriever Ping

ICMP_Nemesis v1.1 Echo

ICMP_PING *NIX

ICMP_PING BayRS Router

ICMP_PING BeOS4.x

ICMP_PING BSDtype

ICMP_PING Cisco Type.x

ICMP_PING CyberKit 2.2 Windows

ICMP_PING Delphi_Piette Windows

ICMP_PING Flowpoint2200 or Network Management Software

ICMP_PING IP NetMonitor Macintosh

ICMP_PING Microsoft Windows

ICMP_PING Network Toolbox 3 Windows

ICMP_PING Pinger Windows

ICMP_PING Seer Windows

ICMP_PING speedera

ICMP_PING WhatsupGold Windows

ICMP_PING Windows

ICMP_TJPingPro1.1Build 2 Windows

ICMP_webtrends scanner

                                                                                                                                              Top

FTP

FTP_Aix Overflow Vulnerability

FTP_EXPLOIT NextFTP client overflow

FTP_Forward

FTP_MKDIR

FTP_Openbsd Vulnerability

FTP_Overflow Vulnerability1

FTP_Overflow Vulnerability2

FTP_Passwd Retrieval Attempt

FTP_Password

FTP_RETR

FTP_rhost

FTP_Root

FTP_Satan Scan

FTP_Site CDPATH

FTP_Site Command

FTP_Site Execute

FTP_Site_tar

FTP_Solaris28 Format String Vulnerability

FTP_STOR

FTP_SYST Command

FTP_tar_parameters

FTP_User

FTP_wh00t

FTP_wuftp260_Venglin_BSD

FTP_Wuftp260_venglin_linux

FTP_Wuftpd260 Siteexec Overflow Vulnerability

FTP_Wuftpd260 Vulnerability

FTP_wuftpd260_tf8 vulnerability

FTP_X86 Linux Overflow Vulnerability1

FTP_X86 Linux Overflow Vulnerability2

FTP_X86 Linux Overflow Vulnerability3

FTP_X86 Linux Vulnerability

                                                                                                                                              Top

TFTP

TFTP_GET Admin.dll

TFTP_GET nc.exe

TFTP_GET passwd

TFTP_GET shadow

TFTP_parent directory

TFTP_root directory

                                                                                                                                              Top

DNS

DNS_BIND_Overflow

DNS_EXPLOIT named 8.2_>8.2.1

DNS_EXPLOIT named overflow ADM

DNS_EXPLOIT named overflow ADMROCKS

DNS_EXPLOIT named overflow attempt

DNS_EXPLOIT named tsig overflow attempt

DNS_EXPLOIT sparc overflow attempt

DNS_EXPLOIT x86 FreeBSD overflow attempt

DNS_EXPLOIT x86 Linux overflow attempt

DNS_EXPLOIT x86 Linux overflow attempt ADMv2

DNS_Named authors attempt

DNS_Named version attempt

DNS_SPOOF query response PTR with TTL of 1 min. and no authority

                                                                                                                                              Top

HTTP

HTTP_.ida/idq_overflow

HTTP_/bin/ls command attempt

HTTP_/bin/ps command attempt

HTTP_/etc/inetd.conf access

HTTP_/etc/motd access

HTTP_/etc/shadow access

HTTP_/usr/bin/cc command attempt

HTTP_/usr/bin/cpp command attempt

HTTP_/usr/bin/g++ command attempt

HTTP_/usr/bin/gcc command attempt

HTTP_/usr/bin/id command attempt

HTTP_/usr/bin/perl execution attempt

HTTP_ActiveX

HTTP_AnyFormPost

HTTP_ASP Backdoor

HTTP_ASP_Dot

HTTP_bin/nasm command attempt

HTTP_bin/python access attempt

HTTP_Cachemgr

HTTP_Campas cgi_bin

HTTP_cc command attempt

HTTP_CGI_w3_msql_solaris overflow

HTTP_CGI_whoisraw Access

HTTP_chgrp command attempt

HTTP_chmod command attempt

HTTP_chown command attempt

HTTP_chsh command attempt

HTTP_Classifieds_Post

HTTP_conf/httpd.conf attempt

HTTP_Convert

HTTP_Count

HTTP_cpp command attempt

HTTP_echo command attempt

HTTP_EXPLOIT Netscape 4.7 client overflow

HTTP_EXPLOIT Netscape 4.7 unsucessful overflow

HTTP_g++ command attempt

HTTP_gcc command attempt

HTTP_Glimpse Command

HTTP_Handler

HTTP_Head request

HTTP_HTMLscript

HTTP_ID command attempt

HTTP_IIS_UNICODE

HTTP_IIS_UTF

HTTP_IISADMPWD _aexp

HTTP_IISADMPWD _anot

HTTP_IISADMPWD_achg

HTTP_IISHTR Overflow

HTTP_Info

HTTP_ISS$DATA

HTTP_kill command attempt

HTTP_LNK/URL

HTTP_lsof command attempt

HTTP_MachineInfo

HTTP_mail command attempt

HTTP_msadcs_adctest

HTTP_msadcs_msadc

HTTP_msadcs_showcode

HTTP_nasm command attempt

HTTP_netcat command attempt

HTTP_nmap command attempt

HTTP_Novell Files

HTTP_Nph_test

HTTP_nt admin addition attempt

HTTP_Objects were not found

HTTP_oop_qfullhit

HTTP_oop_qsumrhit

HTTP_palscgi_request

HTTP_PerlIS.dll_overflow

HTTP_Pfdisplay Execute

HTTP_Pfdisplay Read

HTTP_PHF

HTTP_PHP File Read

HTTP_PHP Overflow

HTTP_ping command attempt

HTTP_Post

HTTP_Printer Access

HTTP_ps command attempt

HTTP_python access attempt

HTTP_RegEcho

HTTP_rm command attempt

HTTP_Robots

HTTP_search_qfullhit

HTTP_search_qsumrhit

HTTP_Shell Access

HTTP_SiteCsc Access

HTTP_SQL Attempt to Increase the System Users

HTTP_SqlCmdShell

HTTP_tclsh execution attempt

HTTP_TestCgi

HTTP_tftp command attempt

HTTP_traceroute command attempt

HTTP_uname _a command attempt

HTTP_Unix_Password

HTTP_Uploader.exe Access

HTTP_View Source

HTTP_Webdist.cgi Arbitrary Command Attempt

HTTP_Webgais

HTTP_Websendmail

HTTP_wget command attempt

HTTP_X application to remote host attempt

HTTP_xterm command attempt

WEB_CGI /cart/cart.cgi access

WEB_CGI /cgi_bin/ access

WEB_CGI /cgi_bin/jj access

WEB_CGI /cgi_bin/ls access

WEB_CGI /cgi_dos/ access

WEB_CGI /fcgi_bin/echo.exe access

WEB_CGI /wwwboard/passwd.txt access

WEB_CGI a1stats a1disp3.cgi access

WEB_CGI a1stats a1disp3.cgi directory traversal attempt

WEB_CGI a1stats access

WEB_CGI ad.cgi access

WEB_CGI adcycle access

WEB_CGI admentor admin.asp access

WEB_CGI admin.pl access

WEB_CGI ads.cgi command execution attempt

WEB_CGI aglimpse access

WEB_CGI agora.cgi access

WEB_CGI agora.cgi attempt

WEB_CGI AHG search.cgi access

WEB_CGI album.pl access

WEB_CGI alchemy http server NUL arbitrary command execution attempt

WEB_CGI alchemy http server PRN arbitrary command execution attempt

WEB_CGI alert.cgi access

WEB_CGI alibaba.pl access

WEB_CGI alibaba.pl arbitrary command execution attempt

WEB_CGI AlienForm af.cgi access

WEB_CGI AlienForm af.cgi directory traversal attempt

WEB_CGI alienform.cgi access

WEB_CGI alienform.cgi directory traversal attempt

WEB_CGI Allaire Pro Web Shell attempt

WEB_CGI AltaVista Intranet Search directory traversal attempt

WEB_CGI alya.cgi access

WEB_CGI Amaya templates sendtemp.pl access

WEB_CGI Amaya templates sendtemp.pl directory traversal attempt

WEB_CGI anaconda directory transversal attempt

WEB_CGI anform2 access

WEB_CGI AnyForm2 access

WEB_CGI archie access

WEB_CGI args.bat access

WEB_CGI args.cmd access

WEB_CGI Armada Style Master Index directory traversal

WEB_CGI AT_admin.cgi access

WEB_CGI AT_generated.cgi access

WEB_CGI auktion.cgi access

WEB_CGI auktion.cgi directory traversal attempt

WEB_CGI awstats access

WEB_CGI ax_admin.cgi access

WEB_CGI axs.cgi access

WEB_CGI bb_hist.sh access

WEB_CGI bb_hist.sh attempt

WEB_CGI bb_histlog.sh access

WEB_CGI bb_histsvc.sh access

WEB_CGI bb_hostscv.sh access

WEB_CGI bb_hostscv.sh attempt

WEB_CGI bb_rep.sh access

WEB_CGI bb_replog.sh access

WEB_CGI bbs_forum.cgi access

WEB_CGI bigconf.cgi access

WEB_CGI bizdbsearch access

WEB_CGI bizdbsearch attempt

WEB_CGI bnbform.cgi access

WEB_CGI book.cgi access

WEB_CGI book.cgi arbitrary command execution attempt

WEB_CGI bsguest.cgi access

WEB_CGI bslist.cgi access

WEB_CGI Bugzilla doeditvotes.cgi access

WEB_CGI cached_feed.cgi moreover shopping cart access

WEB_CGI cached_feed.cgi moreover shopping cart directory traversal

WEB_CGI cachemgr.cgi access

WEB_CGI cal_make.pl access

WEB_CGI cal_make.pl directory traversal attempt

WEB_CGI calendar access

WEB_CGI calendar_admin.pl access

WEB_CGI calendar_admin.pl access

WEB_CGI calendar_admin.pl arbitrary command execution attempt

WEB_CGI campas access

WEB_CGI campus access

WEB_CGI campus attempt

WEB_CGI cart.cgi access

WEB_CGI cart32.exe access

WEB_CGI catgy.cgi access

WEB_CGI CCBill whereami.cgi access

WEB_CGI CCBill whereami.cgi arbitrary command execution attempt

WEB_CGI cgforum.cgi access

WEB_CGI cgicso access

WEB_CGI cgiforum.pl access

WEB_CGI cgiforum.pl attempt

WEB_CGI cgimail access

WEB_CGI cgiwrap access

WEB_CGI chipcfg.cgi access

WEB_CGI classifieds.cgi access

WEB_CGI commerce.cgi access

WEB_CGI commerce.cgi arbitrary file access attempt

WEB_CGI count.cgi access

WEB_CGI CSMailto.cgi access

WEB_CGI csNews.cgi access

WEB_CGI csPassword password.cgi.tmp access

WEB_CGI csPassword.cgi access

WEB_CGI csSearch.cgi access

WEB_CGI csSearch.cgi arbitrary command execution attempt

WEB_CGI cvslog.cgi access

WEB_CGI cvsview2.cgi access

WEB_CGI cvsweb.cgi access

WEB_CGI day5datacopier.cgi access

WEB_CGI day5datanotifier.cgi access

WEB_CGI db2www access

WEB_CGI dbman db.cgi access

WEB_CGI dcboard.cgi access

WEB_CGI dcboard.cgi invalid user addition attempt

WEB_CGI dcforum.cgi access

WEB_CGI dcforum.cgi directory traversal attempt

WEB_CGI DCShop access

WEB_CGI DCShop auth_user_file.txt access

WEB_CGI DCShop orders.txt access

WEB_CGI dfire.cgi access

WEB_CGI directorypro.cgi access

WEB_CGI directorypro.cgi attempt

WEB_CGI dnewsweb.cgi access

WEB_CGI document.d2w access

WEB_CGI download.cgi access

WEB_CGI dumpenv.pl access

WEB_CGI echo.bat access

WEB_CGI echo.bat arbitrary command execution attempt

WEB_CGI edit_action.cgi access

WEB_CGI Emumail emumail.fcgi access

WEB_CGI Emumail init.emu access

WEB_CGI emumail.cgi access

WEB_CGI emumail.cgi NULL attempt

WEB_CGI enter_bug.cgi access

WEB_CGI enter_bug.cgi arbitrary command attempt

WEB_CGI environ.cgi access

WEB_CGI environ.pl access

WEB_CGI envout.bat access

WEB_CGI envout.bat arbitrary command execution attempt

WEB_CGI eshop.pl access

WEB_CGI eshop.pl arbitrary commane execution attempt

WEB_CGI everythingform.cgi access

WEB_CGI eXtropia webstore access

WEB_CGI eXtropia webstore directory traversal

WEB_CGI ezadmin.cgi access

WEB_CGI ezboard.cgi access

WEB_CGI ezman.cgi access

WEB_CGI faqmanager.cgi access

WEB_CGI faqmanager.cgi arbitrary file access attempt

WEB_CGI faxsurvey access

WEB_CGI filemail access

WEB_CGI files.pl access

WEB_CGI fileseek.cgi access

WEB_CGI finger access

WEB_CGI flexform access

WEB_CGI fom.cgi access

WEB_CGI FormHandler.cgi access

WEB_CGI FormHandler.cgi directory traversal attempt attempt

WEB_CGI FormHandler.cgi external site redirection attempt

WEB_CGI formmail access

WEB_CGI formmail arbitrary command execution attempt

WEB_CGI gbook.cgi access

WEB_CGI getdoc.cgi access

WEB_CGI glimpse access

WEB_CGI global.cgi access

WEB_CGI gozila.cgi access

WEB_CGI guestbook.cgi access

WEB_CGI guestserver.cgi access

WEB_CGI hello.bat access

WEB_CGI hello.bat arbitrary command execution attempt

WEB_CGI Home Free search.cgi directory traversal attempt

WEB_CGI htmlscript access

WEB_CGI htmlscript attempt

WEB_CGI htsearch access

WEB_CGI htsearch arbitrary configuration file attempt

WEB_CGI htsearch arbitrary file read attempt

WEB_CGI HyperSeek hsx.cgi access

WEB_CGI HyperSeek hsx.cgi directory traversal attempt

WEB_CGI ibillpm.pl access

WEB_CGI icat access

WEB_CGI ikonboard.cgi access

WEB_CGI imageFolio.cgi access

WEB_CGI imagemap.exe access

WEB_CGI imagemap.exe overflow attempt

WEB_CGI info2www access

WEB_CGI input.bat access

WEB_CGI input.bat arbitrary command execution attempt

WEB_CGI input2.bat access

WEB_CGI input2.bat arbitrary command execution attempt

WEB_CGI lastlines.cgi access

WEB_CGI listrec.pl access

WEB_CGI loadpage.cgi access

WEB_CGI loadpage.cgi directory traversal attempt

WEB_CGI LWGate access

WEB_CGI MachineInfo access

WEB_CGI MachineInfo access

WEB_CGI mailfile.cgi access

WEB_CGI mailit.pl access

WEB_CGI maillist.pl access

WEB_CGI mailman directory traversal attempt

WEB_CGI mailnews.cgi access

WEB_CGI mailview.cgi access

WEB_CGI man.sh access

WEB_CGI math_sum.mscgi access

WEB_CGI MDaemon form2raw.cgi access

WEB_CGI ministats admin access

WEB_CGI mmstdod.cgi access

WEB_CGI mrtg.cgi directory traversal attempt

WEB_CGI multidiff.cgi access

WEB_CGI NetScreen SA 5000 delhomepage.cgi access

WEB_CGI newdesk access

WEB_CGI newsdesk.cgi access

WEB_CGI Nortel Contivity cgiproc access

WEB_CGI Nortel Contivity cgiproc DOS attempt

WEB_CGI nph_exploitscanget.cgi access

WEB_CGI NPH_publish access

WEB_CGI nph_publish.cgi access

WEB_CGI nph_test_cgi access

WEB_CGI nsManager.cgi access

WEB_CGI Oracle reports CGI access

WEB_CGI overflow.cgi access

WEB_CGI pagelog.cgi access

WEB_CGI pagelog.cgi directory traversal attempt

WEB_CGI pals_cgi access

WEB_CGI pals_cgi arbitrary file access attempt

WEB_CGI parse_xml.cgi access

WEB_CGI perl command attempt

WEB_CGI perl.exe access

WEB_CGI perl.exe command attempt

WEB_CGI perlshop.cgi access

WEB_CGI pfdispaly.cgi access

WEB_CGI pfdispaly.cgi arbitrary command execution attempt

WEB_CGI pfdisplay.cgi access

WEB_CGI pgpmail.pl access

WEB_CGI phf access

WEB_CGI phf arbitrary command execution attempt

WEB_CGI php.cgi access

WEB_CGI Poll_it access

WEB_CGI post_query access

WEB_CGI ppdscgi.exe access

WEB_CGI printenv access

WEB_CGI printmail.cgi access

WEB_CGI process_bug.cgi access

WEB_CGI processit access

WEB_CGI psunami.cgi access

WEB_CGI quickstore.cgi access

WEB_CGI readmail.cgi access

WEB_CGI redirect access

WEB_CGI register.cgi access

WEB_CGI responder.cgi access

WEB_CGI rguest.exe access

WEB_CGI RiSearch show.pl proxy attempt

WEB_CGI rpc_nlog.pl access

WEB_CGI rpc_smb.pl access

WEB_CGI rwwwshell.pl access

WEB_CGI scriptalias access

WEB_CGI sdbsearch.cgi access

WEB_CGI sdbsearch.cgi access

WEB_CGI search.cgi access

WEB_CGI sendform.cgi access

WEB_CGI sendmessage.cgi access

WEB_CGI service.cgi access

WEB_CGI setpasswd.cgi access

WEB_CGI SGI InfoSearch fname access

WEB_CGI SGI InfoSearch fname attempt

WEB_CGI shopping cart directory traversal

WEB_CGI simplestmail.cgi access

WEB_CGI siteUserMod.cgi access

WEB_CGI SIX webboard generate.cgi access

WEB_CGI SIX webboard generate.cgi attempt

WEB_CGI smartsearch.cgi access

WEB_CGI snork.bat access

WEB_CGI snorkerz.cmd access

WEB_CGI sojourn.cgi access

WEB_CGI sojourn.cgi File attempt

WEB_CGI spin_client.cgi access

WEB_CGI statsconfig.pl access

WEB_CGI store.cgi access

WEB_CGI store.cgi directory traversal attempt

WEB_CGI survey.cgi access

WEB_CGI swc access

WEB_CGI SWSoft ASPSeek Overflow attempt

WEB_CGI swsrv.cgi access

WEB_CGI Talentsoft Web+ exploit attempt

WEB_CGI talkback.cgi access

WEB_CGI talkback.cgi directory traversal attempt

WEB_CGI technote main.cgi file directory traversal attempt

WEB_CGI technote print.cgi directory traversal attempt

WEB_CGI test.bat access

WEB_CGI test.bat arbitrary command execution attempt

WEB_CGI test.cgi access

WEB_CGI test_cgi access

WEB_CGI test_cgi attempt

WEB_CGI testcgi access

WEB_CGI textcounter.pl access

WEB_CGI tst.bat access

WEB_CGI tstisapi.dll access

WEB_CGI ttawebtop.cgi access

WEB_CGI ttawebtop.cgi arbitrary file attempt

WEB_CGI txt2html.cgi access

WEB_CGI txt2html.cgi directory traversal attempt

WEB_CGI upload.cgi access

WEB_CGI upload.pl access

WEB_CGI uploader.exe access

WEB_CGI user_update_admin.pl access

WEB_CGI user_update_passwd.pl access

WEB_CGI ustorekeeper.pl access

WEB_CGI ustorekeeper.pl directory traversal attempt

WEB_CGI view_broadcast.cgi access

WEB_CGI view_source access

WEB_CGI view_source directory traversal

WEB_CGI viralator.cgi access

WEB_CGI visadmin.exe access

WEB_CGI vpasswd.cgi access

WEB_CGI w3_msql access

WEB_CGI w3tvars.pm access

WEB_CGI wais.pl access

WEB_CGI way_board access

WEB_CGI way_board.cgi access

WEB_CGI wayboard attempt

WEB_CGI Web Shopper shopper.cgi attempt

WEB_CGI web_map.cgi access

WEB_CGI webdist.cgi access

WEB_CGI webdist.cgi arbitrary command attempt

WEB_CGI webdriver access

WEB_CGI webgais access

WEB_CGI webplus directory traversal

WEB_CGI webplus version access

WEB_CGI websendmail access

WEB_CGI websitepro path access

WEB_CGI webspeed access

WEB_CGI webspirs.cgi access

WEB_CGI webspirs.cgi directory traversal attempt

WEB_CGI wguest.exe access

WEB_CGI whois_raw.cgi access

WEB_CGI whois_raw.cgi arbitrary command execution attempt

WEB_CGI win_c_sample.exe access

WEB_CGI wrap access

WEB_CGI ws_mail.cgi access

WEB_CGI www_sql access

WEB_CGI wwwadmin.pl access

WEB_CGI wwwwais access

WEB_CGI yabb access

WEB_CGI yabb directory traversal attempt

WEB_CGI zml.cgi access

WEB_CGI zml.cgi attempt

WEB_CLIENT Javascript document.domain attempt

WEB_CLIENT Javascript URL host spoofing attempt

WEB_CLIENT Microsoft emf metafile access

WEB_CLIENT Microsoft wmf metafile access

WEB_CLIENT Norton antivirus sysmspam.dll load attempt

WEB_CLIENT OLE32 MSHTA masquerade attempt

WEB_CLIENT Outlook EML access

WEB_CLIENT readme.eml autoload attempt

WEB_CLIENT readme.eml download attempt

WEB_CLIENT XMLHttpRequest attempt

WEB_COLDFUSION ?Mode=debug attempt

WEB_COLDFUSION addcontent.cfm access

WEB_COLDFUSION admin decrypt attempt

WEB_COLDFUSION admin encrypt attempt

WEB_COLDFUSION administrator access

WEB_COLDFUSION application.cfm access

WEB_COLDFUSION application.cfm access

WEB_COLDFUSION beaninfo access

WEB_COLDFUSION cfappman access

WEB_COLDFUSION cfcache.map access

WEB_COLDFUSION cfmlsyntaxcheck.cfm access

WEB_COLDFUSION CFUSION_VERIFYMAIL access

WEB_COLDFUSION datasource attempt

WEB_COLDFUSION datasource password attempt

WEB_COLDFUSION datasource username attempt

WEB_COLDFUSION db connections flush attempt

WEB_COLDFUSION displayfile access

WEB_COLDFUSION evaluate.cfm access

WEB_COLDFUSION exampleapp access

WEB_COLDFUSION exampleapp application.cfm

WEB_COLDFUSION expeval access

WEB_COLDFUSION exprcalc access

WEB_COLDFUSION fileexists.cfm access

WEB_COLDFUSION getfile.cfm access

WEB_COLDFUSION getodbcdsn access

WEB_COLDFUSION getodbcin attempt

WEB_COLDFUSION gettempdirectory.cfm access

WEB_COLDFUSION mainframeset access

WEB_COLDFUSION onrequestend.cfm access

WEB_COLDFUSION parks access

WEB_COLDFUSION sendmail.cfm access

WEB_COLDFUSION set odbc ini attempt

WEB_COLDFUSION settings refresh attempt

WEB_COLDFUSION snippets attempt

WEB_COLDFUSION startstop DOS access

WEB_FRONTPAGE .... request

WEB_FRONTPAGE /_vti_bin/ access

WEB_FRONTPAGE _vti_inf.html access

WEB_FRONTPAGE _vti_rpc access

WEB_FRONTPAGE access.cnf access

WEB_FRONTPAGE administrators.pwd access

WEB_FRONTPAGE author.exe access

WEB_FRONTPAGE authors.pwd access

WEB_FRONTPAGE cfgwiz.exe access

WEB_FRONTPAGE contents.htm access

WEB_FRONTPAGE dvwssr.dll access

WEB_FRONTPAGE form_results access

WEB_FRONTPAGE form_results.htm access

WEB_FRONTPAGE fpadmcgi.exe access

WEB_FRONTPAGE fpadmin.htm access

WEB_FRONTPAGE fpremadm.exe access

WEB_FRONTPAGE fpsrvadm.exe access

WEB_FRONTPAGE frontpage rad fp4areg.dll access

WEB_FRONTPAGE orders.htm access

WEB_FRONTPAGE orders.txt access

WEB_FRONTPAGE posting

WEB_FRONTPAGE rad fp30reg.dll access

WEB_FRONTPAGE register.htm access

WEB_FRONTPAGE register.txt access

WEB_FRONTPAGE registrations.htm access

WEB_FRONTPAGE registrations.txt access

WEB_FRONTPAGE service.cnf access

WEB_FRONTPAGE service.pwd

WEB_FRONTPAGE service.stp access

WEB_FRONTPAGE services.cnf access

WEB_FRONTPAGE shtml.dll access

WEB_FRONTPAGE shtml.exe access

WEB_FRONTPAGE svcacl.cnf access

WEB_FRONTPAGE users.pwd access

WEB_FRONTPAGE writeto.cnf access

WEB_IIS *.idc attempt

WEB_IIS +.htr code fragment attempt

WEB_IIS .asp chunked Transfer_Encoding

WEB_IIS .bat? access

WEB_IIS .cnf access

WEB_IIS .htr access

WEB_IIS .htr chunked Transfer_Encoding

WEB_IIS /exchange/root.asp access

WEB_IIS /exchange/root.asp attempt

WEB_IIS /iisadmpwd/aexp2.htr access

WEB_IIS /isapi/tstisapi.dll access

WEB_IIS /msadc/samples/ access

WEB_IIS /pcadmin/login.asp access

WEB_IIS /scripts/iisadmin/default.htm access

WEB_IIS /scripts/samples/ access

WEB_IIS /StoreCSVS/InstantOrder.asmx request

WEB_IIS _mem_bin access

WEB_IIS achg.htr access

WEB_IIS Alternate Data streams ASP file access attempt

WEB_IIS anot.htr access

WEB_IIS as_web.exe access

WEB_IIS as_web4.exe access

WEB_IIS ASP contents view

WEB_IIS ASP contents view

WEB_IIS asp_dot attempt

WEB_IIS asp_srch attempt

WEB_IIS Battleaxe Forum login.asp access

WEB_IIS bdir.htr access

WEB_IIS CGImail.exe access

WEB_IIS cmd.exe access

WEB_IIS cmd32.exe access

WEB_IIS cmd? access

WEB_IIS CodeRed v2 root.exe access

WEB_IIS cross_site scripting attempt

WEB_IIS cross_site scripting attempt

WEB_IIS ctss.idc access

WEB_IIS del attempt

WEB_IIS directory listing

WEB_IIS Directory transversal attempt

WEB_IIS DirectoryListing.asp access

WEB_IIS doctodep.btr access

WEB_IIS encoding access

WEB_IIS exec_src access

WEB_IIS foxweb.dll access

WEB_IIS foxweb.exe access

WEB_IIS fpcount access

WEB_IIS fpcount attempt

WEB_IIS getdrvs.exe access

WEB_IIS global.asa access

WEB_IIS htimage.exe access

WEB_IIS httpodbc.dll access _nimda

WEB_IIS idc_srch attempt

WEB_IIS iisadmin access

WEB_IIS iisadmpwd attempt

WEB_IIS IISProtect access

WEB_IIS IISProtect globaladmin.asp access

WEB_IIS IISProtect siteadmin.asp access

WEB_IIS iissamples access

WEB_IIS ISAPI .ida access

WEB_IIS ISAPI .ida attempt

WEB_IIS ISAPI .idq access

WEB_IIS ISAPI .idq attempt

WEB_IIS ISAPI .printer access

WEB_IIS isc$data attempt

WEB_IIS ism.dll access

WEB_IIS ism.dll attempt

WEB_IIS jet vba access

WEB_IIS mkilog.exe access

WEB_IIS MS BizTalk server access

WEB_IIS MS Site Server admin attempt

WEB_IIS msadcs.dll access

WEB_IIS msdac access

WEB_IIS MSProxy access

WEB_IIS newdsn.exe access

WEB_IIS NewsPro administration authentication attempt

WEB_IIS nsiislog.dll access

WEB_IIS NTLM ASN.1 vulnerability scan attempt

WEB_IIS outlook web dos

WEB_IIS pbserver access

WEB_IIS perl access

WEB_IIS perl_browse newline attempt

WEB_IIS perl_browse space attempt

WEB_IIS ping.asp access

WEB_IIS postinfo.asp access

WEB_IIS register.asp access

WEB_IIS repost.asp access

WEB_IIS SAM Attempt

WEB_IIS scripts_browse access

WEB_IIS search97.vts access

WEB_IIS sgdynamo.exe access

WEB_IIS showcode.asp access

WEB_IIS site server config access

WEB_IIS site/iisamples access

WEB_IIS SmarterTools SmarterMail frmCompose.asp access

WEB_IIS SmarterTools SmarterMail frmGetAttachment.aspx access

WEB_IIS SmarterTools SmarterMail login.aspx buffer overflow attempt

WEB_IIS srch.htm access

WEB_IIS srchadm access

WEB_IIS Synchrologic Email Accelerator userid list access attempt

WEB_IIS trace.axd access

WEB_IIS uploadn.asp access

WEB_IIS UploadScript11.asp access

WEB_IIS users.xml access

WEB_IIS view source via translate header

WEB_IIS viewcode.asp access

WEB_IIS VP_ASP ShopDisplayProducts.asp access

WEB_IIS VP_ASP shopsearch.asp access

WEB_IIS WEBDAV exploit attempt

WEB_IIS WebDAV file lock attempt

WEB_IIS WEBDAV nessus safe scan attempt

WEB_IIS webhits access

WEB_MISC *%0a.pl access

WEB_MISC .bash_history access

WEB_MISC .DS_Store access

WEB_MISC .FBCIndex access

WEB_MISC .history access

WEB_MISC .htaccess access

WEB_MISC .htgroup access

WEB_MISC .htpasswd access

WEB_MISC .nsconfig access

WEB_MISC .wwwacl access

WEB_MISC /*.shtml access

WEB_MISC /.... access

WEB_MISC ///cgi_bin access

WEB_MISC /Carello/add.exe access

WEB_MISC /cgi_bin/// access

WEB_MISC /CVS/Entries access

WEB_MISC /doc/ access

WEB_MISC /doc/packages access

WEB_MISC /ecscripts/ecware.exe access

WEB_MISC /etc/passwd

WEB_MISC /home/ftp access

WEB_MISC /home/www access

WEB_MISC /~ftp access

WEB_MISC /~nobody access

WEB_MISC /~root access

WEB_MISC 3Com 3CRADSL72 ADSL 11g Wireless Router app_sta.stm access attempt

WEB_MISC ?PageServices access

WEB_MISC active.log access

WEB_MISC Admin_files access

WEB_MISC adminlogin access

WEB_MISC Allaire JRUN DOS attempt

WEB_MISC amazon 1_click cookie theft

WEB_MISC Annex Terminal DOS attempt

WEB_MISC ans.pl access

WEB_MISC ans.pl attempt

WEB_MISC answerbook2 admin attempt

WEB_MISC answerbook2 arbitrary command execution attempt

WEB_MISC apache ?M=D directory list attempt

WEB_MISC apache chunked encoding memory corruption exploit attempt

WEB_MISC Apache Chunked_Encoding worm attempt

WEB_MISC apache directory disclosure attempt

WEB_MISC apache source.asp file access

WEB_MISC architext_query.pl access

WEB_MISC AuthChangeUrl access

WEB_MISC Axis Storpoint CD access

WEB_MISC AxisStorpoint CD attempt

WEB_MISC b2 arbitrary command execution attempt

WEB_MISC backup access

WEB_MISC bad HTTP/1.1 request, Potentially worm attack

WEB_MISC basilix mysql.class access

WEB_MISC basilix sendmail.inc access

WEB_MISC BBoard access

WEB_MISC BigBrother access

WEB_MISC BitKeeper arbitrary command attempt

WEB_MISC bsml.pl access

WEB_MISC BugPort config.conf file access

WEB_MISC carbo.dll access

WEB_MISC cart 32 AdminPwd access

WEB_MISC cd..

WEB_MISC cgitest.exe access

WEB_MISC cgitest.exe attempt

WEB_MISC cgiWebupdate.exe access

WEB_MISC changepw.exe access

WEB_MISC chip.ini access

WEB_MISC Chunked_Encoding transfer attempt

WEB_MISC Cisco Catalyst command execution attempt

WEB_MISC Cisco IOS HTTP configuration attempt

WEB_MISC CISCO PIX Firewall Manager directory traversal attempt

WEB_MISC CISCO VoIP DOS ATTEMPT

WEB_MISC CISCO VoIP Portinformation access

WEB_MISC Compaq Insight directory traversal

WEB_MISC Compaq web_based management agent denial of service attempt

WEB_MISC console.exe access

WEB_MISC ContentFilter.dll access

WEB_MISC convert.bas access

WEB_MISC counter.exe access

WEB_MISC cPanel resetpass access

WEB_MISC cpshost.dll access

WEB_MISC cross site scripting attempt

WEB_MISC cross site scripting HTML Image tag set to javascript attempt

WEB_MISC Crystal Reports crystalimagehandler.aspx access

WEB_MISC Crystal Reports crystalImageHandler.aspx directory traversal attempt

WEB_MISC cs.exe access

WEB_MISC cvsweb version access

WEB_MISC cwmail.exe access

WEB_MISC cybercop scan

WEB_MISC DB4Web access

WEB_MISC ddicgi.exe access

WEB_MISC Delegate whois overflow attempt

WEB_MISC DELETE attempt

WEB_MISC Demarc SQL injection attempt

WEB_MISC Domino agentrunner.nsf access

WEB_MISC Domino bookmark.nsf access

WEB_MISC Domino catalog.nsf access

WEB_MISC Domino cersvr.nsf access

WEB_MISC Domino collect4.nsf access

WEB_MISC Domino domcfg.nsf access

WEB_MISC Domino domlog.nsf access

WEB_MISC Domino events4.nsf access

WEB_MISC Domino log.nsf access

WEB_MISC Domino mab.nsf access

WEB_MISC Domino mail.box access

WEB_MISC Domino mailw46.nsf access

WEB_MISC Domino names.nsf access

WEB_MISC Domino ntsync4.nsf access

WEB_MISC Domino setup.nsf access

WEB_MISC Domino statrep.nsf access

WEB_MISC Domino webadmin.nsf access

WEB_MISC Ecommerce check.txt access

WEB_MISC Ecommerce checks.txt access

WEB_MISC Ecommerce import.txt access

WEB_MISC edittag.pl access

WEB_MISC ExAir access

WEB_MISC filemail access

WEB_MISC ftp attempt

WEB_MISC ftp.pl access

WEB_MISC ftp.pl attempt

WEB_MISC get32.exe access

WEB_MISC global.inc access

WEB_MISC globals.jsa access

WEB_MISC globals.pl access

WEB_MISC guestbook.pl access

WEB_MISC handler access

WEB_MISC handler attempt

WEB_MISC helpout.exe access

WEB_MISC HP OpenView Manager DOS

WEB_MISC htgrep access

WEB_MISC htgrep attempt

WEB_MISC http directory traversal

WEB_MISC IBM Net.Commerce orderdspc.d2w access

WEB_MISC iChat directory traversal attempt

WEB_MISC ICQ Webfront HTTP DOS

WEB_MISC ICQ webserver DOS

WEB_MISC InteractiveQuery.jsp access

WEB_MISC intranet access

WEB_MISC Invalid HTTP Version String

WEB_MISC Invision Power Board search.pl access

WEB_MISC ion_p access

WEB_MISC iPlanet .perf access

WEB_MISC iPlanet GETPROPERTIES attempt

WEB_MISC iPlanet Search directory traversal attempt

WEB_MISC ISAPISkeleton.dll access

WEB_MISC jigsaw dos attempt

WEB_MISC jrun directory browse attempt

WEB_MISC L3retriever HTTP Probe

WEB_MISC logicworks.ini access

WEB_MISC login.htm access

WEB_MISC login.htm attempt

WEB_MISC Lotus DelDoc attempt

WEB_MISC Lotus Domino directory traversal

WEB_MISC Lotus EditDoc attempt

WEB_MISC Lotus Notes .csp script source download attempt

WEB_MISC Lotus Notes .pl script source download attempt

WEB_MISC lyris.pl access

WEB_MISC Macromedia SiteSpring cross site scripting attempt

WEB_MISC mailman cross site scripting attempt

WEB_MISC mall log order access

WEB_MISC mkplog.exe access

WEB_MISC mlog.phtml access

WEB_MISC mod_gzip_status access

WEB_MISC mod_plsql administration access

WEB_MISC MsmMask.exe access

WEB_MISC MsmMask.exe attempt

WEB_MISC musicat empower access

WEB_MISC musicat empower attempt

WEB_MISC mylog.phtml access

WEB_MISC nc.exe attempt

WEB_MISC ndcgi.exe access

WEB_MISC nessus 1.X 404 probe

WEB_MISC nessus 2.x 404 probe

WEB_MISC net attempt

WEB_MISC Netscape admin passwd

WEB_MISC Netscape dir index wp

WEB_MISC Netscape Enterprise directory listing attempt

WEB_MISC Netscape Enterprise DOS

WEB_MISC Netscape Enterprise Server directory view

WEB_MISC Netscape PublishingXpert access

WEB_MISC Netscape Servers suite DOS

WEB_MISC Netscape Unixware overflow

WEB_MISC newsscript.pl admin attempt

WEB_MISC Novell Groupwise gwweb.exe access

WEB_MISC Novell Groupwise gwweb.exe attempt

WEB_MISC nstelemetry.adp access

WEB_MISC Oracle Dynamic Monitoring Services dms access

WEB_MISC Oracle Java Process Manager access

WEB_MISC oracle portal demo access

WEB_MISC oracle web application server access

WEB_MISC oracle web arbitrary command execution attempt

WEB_MISC Oracle XSQLConfig.xml access

WEB_MISC PCCS mysql database admin tool access

WEB_MISC PeopleSoft PeopleBooks psdoccgi access

WEB_MISC perl post attempt

WEB_MISC philboard.mdb access

WEB_MISC philboard_admin.asp access

WEB_MISC philboard_admin.asp authentication bypass attempt

WEB_MISC Phorecast remote code execution attempt

WEB_MISC PIX firewall manager directory traversal attempt

WEB_MISC plusmail access

WEB_MISC post32.exe access

WEB_MISC post32.exe arbitrary command attempt

WEB_MISC queryhit.htm access

WEB_MISC RBS ISP /newuser directory traversal attempt

WEB_MISC RBS ISP /newuser access

WEB_MISC rcmd attempt

WEB_MISC redirect.exe access

WEB_MISC register.dll access

WEB_MISC ROADS search.pl attempt

WEB_MISC robot.txt access

WEB_MISC robots.txt access

WEB_MISC rpm_query access

WEB_MISC sadmind worm access

WEB_MISC SalesLogix Eviewer access

WEB_MISC SalesLogix Eviewer web command attempt

WEB_MISC sambar /search/results.stm access

WEB_MISC Sample_showcode.html access

WEB_MISC search.dll access

WEB_MISC search.dll directory listing attempt

WEB_MISC search.vts access

WEB_MISC SecureSite authentication bypass attempt

WEB_MISC server_info access

WEB_MISC server_status access

WEB_MISC ServletManager access

WEB_MISC setinfo.hts access

WEB_MISC SFNofitication.dll access

WEB_MISC shopping cart access

WEB_MISC showcode access

WEB_MISC SiteScope Service access

WEB_MISC SmartWin CyberOffice Shopping Cart access

WEB_MISC sml3com access

WEB_MISC source.jsp access

WEB_MISC SpamExcp.dll access

WEB_MISC spamrule.dll access

WEB_MISC sresult.exe access

WEB_MISC Sun JavaServer default password login attempt

WEB_MISC SWEditServlet access

WEB_MISC SWEditServlet directory traversal attempt

WEB_MISC Talentsoft Web+ internal IP Address access

WEB_MISC Talentsoft Web+ Source Code view access

WEB_MISC telnet attempt

WEB_MISC tftp attempt

WEB_MISC Tomcat null byte directory listing attempt

WEB_MISC Tomcat server exploit access

WEB_MISC Tomcat server snoop access

WEB_MISC Tomcat servlet mapping cross site scripting attempt

WEB_MISC Tomcat SnoopServlet servlet access

WEB_MISC Tomcat TroubleShooter servlet access

WEB_MISC Tomcat view source attempt

WEB_MISC TOP10.dll access

WEB_MISC TRACE attempt

WEB_MISC Trend Micro OfficeScan access

WEB_MISC Trend Micro OfficeScan attempt

WEB_MISC ultraboard access

WEB_MISC unify eWave ServletExec DOS

WEB_MISC unify eWave ServletExec upload

WEB_MISC util.pl access

WEB_MISC viewcode access

WEB_MISC VirusWall catinfo access

WEB_MISC VirusWall FtpSave access

WEB_MISC VirusWall FtpSaveCSP access

WEB_MISC VirusWall FtpSaveCVP access

WEB_MISC VsSetCookie.exe access

WEB_MISC WEB_INF access

WEB_MISC webadmin.dll access

WEB_MISC webalizer access

WEB_MISC webcart access

WEB_MISC webcart_lite access

WEB_MISC WebDAV search access

WEB_MISC webfind.exe access

WEB_MISC WebLogic ConsoleHelp view source attempt

WEB_MISC Webnews.exe access

WEB_MISC webplus access

WEB_MISC Webtrends HTTP probe

WEB_MISC whisker HEAD/./

WEB_MISC windmail.exe access

WEB_MISC ws_ftp.ini access

WEB_MISC wsh attempt

WEB_MISC wwwboard.pl access

WEB_MISC xp_availablemedia attempt

WEB_MISC xp_cmdshell attempt

WEB_MISC xp_enumdsn attempt

WEB_MISC xp_filelist attempt

WEB_MISC xp_regdeletekey attempt

WEB_MISC xp_regread attempt

WEB_MISC xp_regwrite attempt

WEB_PHP /_admin access

WEB_PHP admin.php access

WEB_PHP admin.php file upload attempt

WEB_PHP Advanced Poll admin_comment.php access

WEB_PHP Advanced Poll admin_edit.php access

WEB_PHP Advanced Poll admin_embed.php access

WEB_PHP Advanced Poll admin_help.php access

WEB_PHP Advanced Poll admin_license.php access

WEB_PHP Advanced Poll admin_logout.php access

WEB_PHP Advanced Poll admin_password.php access

WEB_PHP Advanced Poll admin_preview.php access

WEB_PHP Advanced Poll admin_settings.php access

WEB_PHP Advanced Poll admin_stats.php access

WEB_PHP Advanced Poll admin_templates.php access

WEB_PHP Advanced Poll admin_templates_misc.php access

WEB_PHP Advanced Poll admin_tpl_misc_new.php access

WEB_PHP Advanced Poll admin_tpl_new.php access

WEB_PHP Advanced Poll booth.php access

WEB_PHP Advanced Poll poll_ssi.php access

WEB_PHP Advanced Poll popup.php access

WEB_PHP authentication_index.php access

WEB_PHP autohtml.php access

WEB_PHP autohtml.php directory traversal attempt

WEB_PHP b2 cafelog gm_2_b2.php access

WEB_PHP bb_smilies.php access

WEB_PHP Blahz_DNS dostuff.php access

WEB_PHP Blahz_DNS dostuff.php modify user attempt

WEB_PHP BLNews objects.inc.php4 access

WEB_PHP calendar.php access

WEB_PHP chatbox.php access

WEB_PHP content_disposition memchr overflow

WEB_PHP Cyboards default_header.php access

WEB_PHP Cyboards options_form.php access

WEB_PHP DatabaseFunctions.php access

WEB_PHP DCP_Portal remote file include attempt

WEB_PHP directory.php access

WEB_PHP directory.php arbitrary command attempt

WEB_PHP DNSTools access

WEB_PHP DNSTools administrator authentication bypass attempt

WEB_PHP DNSTools authentication bypass attempt

WEB_PHP edit_image.php access

WEB_PHP files.inc.php access

WEB_PHP forum_details.php access

WEB_PHP friends.php access

WEB_PHP GlobalFunctions.php access

WEB_PHP IdeaBox cord.php file include

WEB_PHP IdeaBox notification.php file include

WEB_PHP IGeneric Free Shopping Cart page.php access

WEB_PHP Invision Board emailer.php file include

WEB_PHP Invision Board ipchat.php file include

WEB_PHP Mambo upload.php access

WEB_PHP Mambo upload.php upload php file attempt

WEB_PHP Mambo uploadimage.php access

WEB_PHP Mambo uploadimage.php upload php file attempt

WEB_PHP MatrikzGB privilege escalation attempt

WEB_PHP Messagerie supp_membre.php access

WEB_PHP modules.php access

WEB_PHP myPHPNuke chatheader.php access

WEB_PHP myPHPNuke partner.php access

WEB_PHP myphpPagetool pt_config.inc file include

WEB_PHP news.php file include

WEB_PHP newsPHP Language file include attempt

WEB_PHP p_news.php access

WEB_PHP Phorum /support/common.php access

WEB_PHP Phorum /support/common.php attempt

WEB_PHP Phorum admin access

WEB_PHP Phorum authentication access

WEB_PHP Phorum code access

WEB_PHP Phorum read access

WEB_PHP Phorum violation access

WEB_PHP Photopost PHP Pro showphoto.php access

WEB_PHP php.exe access

WEB_PHP PHP_Wiki cross site scripting attempt

WEB_PHP phpBB privmsg.php access

WEB_PHP phpbb quick_reply.php access

WEB_PHP phpbb quick_reply.php arbitrary command attempt

WEB_PHP PhpGedView PGV authentication_index.php base directory manipulation attempt

WEB_PHP PhpGedView PGV base directory manipulation

WEB_PHP PhpGedView PGV config_gedcom.php base directory manipulation attempt

WEB_PHP PhpGedView PGV functions.php base directory manipulation attempt

WEB_PHP PhpGedView search.php access

WEB_PHP PHPLIB remote command attempt

WEB_PHP phpMyAdmin db_details_importdocsql.php access

WEB_PHP phptest.php access

WEB_PHP piranha passwd.php3 access

WEB_PHP read_body.php access attempt

WEB_PHP readmsg.php access

WEB_PHP rolis guestbook access

WEB_PHP rolis guestbook remote file include attempt

WEB_PHP Setup.php access

WEB_PHP shoutbox.php access

WEB_PHP shoutbox.php directory traversal attempt

WEB_PHP smssend.php access

WEB_PHP squirrel mail spell_check arbitrary command attempt

WEB_PHP squirrel mail theme arbitrary command attempt

WEB_PHP strings overflow

WEB_PHP test.php access

WEB_PHP TextPortal admin.php default password 12345 attempt

WEB_PHP TextPortal admin.php default password admin attempt

WEB_PHP Title.php access

WEB_PHP ttCMS header.php access

WEB_PHP Turba status.php access

WEB_PHP TUTOS path disclosure attempt

WEB_PHP Typo3 translations.php file include

WEB_PHP UpdateClasses.php access

WEB_PHP viewtopic.php access

WEB_PHP WAnewsletter db_type.php access

WEB_PHP WAnewsletter newsletter.php file include attempt

WEB_PHP WebChat db_mysql.php file include

WEB_PHP WebChat english.php file include

WEB_PHP YaBB SE packages.php file include

WEB_CLIENT Javascript cookies access

                                                                                                                                              Top

SMTP

SMTP_battle_mail traffic

SMTP_Debug

SMTP_Decode Users

SMTP_ehlo

SMTP_ehlo cybercop attempt

SMTP_exchange mime DOS

SMTP_EXPLOIT sniffit overflow

SMTP_EXPLOIT x86 windows MailMax overflow

SMTP_expn

SMTP_expn cybercop attempt

SMTP_EXPN Overflow Attempt

SMTP_Forward

SMTP_From comment overflow attempt

SMTP_HELO Overflow Attempt

SMTP_majordomo ifs

SMTP_Pipe

SMTP_sendmail 5.6.5 exploit

SMTP_sendmail 8.6.10 exploit

SMTP_sendmail 8.6.9 exploit

SMTP_sendmail 8.6.9 exploit

SMTP_sendmail 8.6.9c exploit

SMTP_STARTTLS attempt

SMTP_TURN

SMTP_vrfy

SMTP_Vrfy Overflow

SMTP_wiz

                                                                                                                                              Top

MSN

MSN_Login attempt

MSN_Outbound file transfer accept

MSN_Outbound file transfer rejected

MSN_Outbound file transfer request

MSN_User search

                                                                                                                                              Top

SNMP

SNMP_Broadcast request

SNMP_Broadcast trap

SNMP_Community string buffer overflow attempt

SNMP_Community string buffer overflow attempt with evasion

SNMP_HP_OpenView

SNMP_Missing community string attempt

SNMP_NT UserList

SNMP_Null community string attempt

SNMP_Private access

SNMP_PROTOS test_suite_req_app attempt

SNMP_Public access

SNMP_Public Passwords

SNMP_Sun

                                                                                                                                              Top

TELNET

TELNET_4Dgifts SGI account attempt

TELNET_access

TELNET_APC SmartSlot default admin account attempt

TELNET_Attempted SU from wrong group

TELNET_bsd exploit client finishing

TELNET_bsd telnet exploit response

TELNET_client ENV OPT USERVAR information disclosure

TELNET_client ENV OPT VAR information disclosure

TELNET_client LINEMODE SLC overflow attempt

TELNET_Delete File

TELNET_EZsetup account attempt

TELNET_Finger User

TELNET_FreeBSD_overflow

TELNET_ld_library_path

TELNET_livingston DOS

TELNET_login buffer overflow attempt

TELNET_Login Failed

TELNET_not on console

TELNET_resolv_host_conf

TELNET_root login

TELNET_SGI telnetd format bug

TELNET_Solaris memory mismanagement exploit attempt

TELNET_TFTP Transfer Files

                                                                                                                                              Top

Finger

FINGER_account enumeration attempt

FINGER_bomb attempt

FINGER_cmd_rootsh backdoor attempt

FINGER_cybercop query

FINGER_Cybercop Redirection

FINGER_Dot Query

FINGER_freebsd_4.1.1

FINGER_null request

FINGER_Redirection

FINGER_remote command execution attempt

FINGER_Remote Command Pipe Execution Attempt

FINGER_Root Query

FINGER_Search Query

FINGER_version query

FINGER_W_Pipe

FINGER_Zero Query