HTTP: IIS "Propfind" Rem HTTP:IIS:PROPFIND Minor Medium

HTTP: IIS "Propfind" Rem HTTP:IIS:PROPFIND Minor Medium

HTTP: IIS "propfind"HTTP:IIS:PROPFIND RemoteMinor DoS medium CVE-2003-0226 7735 HTTP: IkonboardHTTP:CGI:IKONBOARD-BADCOOKIE IllegalMinor Cookie Languagemedium 7361 HTTP: WindowsHTTP:IIS:NSIISLOG-OF Media CriticalServices NSIISlog.DLLcritical BufferCVE-2003-0349 Overflow 8035 MS-RPC: DCOMMS-RPC:DCOM:EXPLOIT ExploitCritical critical CVE-2003-0352 8205 HTTP: WinHelp32.exeHTTP:STC:WINHELP32-OF2 RemoteMinor Buffermedium Overrun CVE-2002-0823(2) 4857 TROJAN: BackTROJAN:BACKORIFICE:BO2K-CONNECT Orifice 2000Major Client Connectionhigh CVE-1999-0660 1648 HTTP: FrontpageHTTP:FRONTPAGE:FP30REG.DLL-OF fp30reg.dllCritical Overflowcritical CVE-2003-0822 9007 SCAN: IIS EnumerationSCAN:II:IIS-ISAPI-ENUMInfo info P2P: DC: DirectP2P:DC:HUB-LOGIN ConnectInfo Plus Plus Clientinfo Hub Login TROJAN: AOLTROJAN:MISC:AOLADMIN-SRV-RESP Admin ServerMajor Responsehigh CVE-1999-0660 TROJAN: DigitalTROJAN:MISC:ROOTBEER-CLIENT RootbeerMinor Client Connectmedium CVE-1999-0660 HTTP: OfficeHTTP:STC:DL:OFFICEART-PROP Art PropertyMajor Table Bufferhigh OverflowCVE-2009-2528 36650 HTTP: AXIS CommunicationsHTTP:STC:ACTIVEX:AXIS-CAMERAMajor Camerahigh Control (AxisCamControl.ocx)CVE-2008-5260 33408 Unsafe ActiveX Control LDAP: IpswitchLDAP:OVERFLOW:IMAIL-ASN1 IMail LDAPMajor Daemonhigh Remote BufferCVE-2004-0297 Overflow 9682 HTTP: AnyformHTTP:CGI:ANYFORM-SEMICOLON SemicolonMajor high CVE-1999-0066 719 HTTP: Mini HTTP:CGI:W3-MSQL-FILE-DISCLSRSQL w3-msqlMinor File View mediumDisclosure CVE-2000-0012 898 HTTP: IIS MFCHTTP:IIS:MFC-EXT-OF ISAPI FrameworkMajor Overflowhigh (via ext.dll) 5188 HTTP: Null httpdHTTP:OVERFLOW:NULLHTTPD-ROOT-OF RemoteCritical Root Buffercritical Overflow 6255 HTTP: MacromediaHTTP:STC:SWF:MAL-SWF-OF FlashWarning ActiveX Bufferlow OverflowCVE-2002-0605 4664 HTTP: MobyHTTP:MISC:MOBY-LENGTH-DOS MalformedMinor Content-Lengthmedium DoS CVE-2001-0275 HTTP: LIB CGIHTTP:CGI:LIBCGI-RFP-OVERWRITE Remote FrameMinor Pointermedium Overwrite TROJAN: WebservTROJAN:MISC:WEBSERVCT10 CT ServerWarning low CVE-1999-0660 HTTP: WebStore2000HTTP:SQL:INJ:WS2000 Item_IDMinor Parametermedium SQL CVE-2004-0304Injection 7766 SKYPE: ClientVOIP:SKYPE:VERSION-CHECK Version CheckInfo info LPR: WindowsLPR:WINDOWS-LPR-DOS Services Minorfor Unix LPRmedium Denial of ServiceCVE-2000-0232 1082 P2P: BitTorrentP2P:BITTORRENT:TRACKER-QUERY TrackerInfo Query info P2P: BitTorrentP2P:BITTORRENT:TRACKER-SCRAPE TrackerInfo Scrape info APP: Hewlett-PackardAPP:HPOV:OALARM-LANG-OF OVAlarmMajor OvAcceptLanghigh CVE-2009-0921 Cookie Parameter34134 Overflow HTTP: AkamaiHTTP:STC:CLSID:ACTIVEX:DLMGR DownloadMajor Manager highActiveX ControlCVE-2007-0942 HTTP: MicrosoftHTTP:STC:ACTIVEX:COM-OBJ COM ObjectMajor Instantiationhigh MemoryCVE-2006-4697 Corruption22486 HTTP: SymantecHTTP:STC:CLSID:ACTIVEX:SYM-FWAX NortonMinor Personal Firewallmedium 2004CVE-2007-1689 ActiveX Control23936 Buffer Overflow SMTP: MicrosoftSMTP:COMMAND:BDAT BDAT WarningDoS low CVE-2002-0055 4204 FTP: acFTP InvalidFTP:USER:ACFTP-BAD-LOGIN LoginWarning Issue low HTTP: NortonHTTP:STC:NORTON:LAUNCHURL-HTTP Internet SecurityMajor LaunchURLhigh ExploitCVE-2004-0364 Attempt 9915 HTTP: NortonHTTP:STC:NORTON:SYMSPAM-HTTP Internet SecurityMajor symspam.dllhigh ExploitCVE-2004-0363 Attempt 9916 HTTP: MSN HTTP:HOTMAIL:FILE-DOWNLOADHotmail FileInfo Downloadinfo HTTP: MSN HTTP:HOTMAIL:EXE-DOWNLOADHotmail ExecutableMinor Filemedium Extension Download DOS: Cisco SyslogDOS:NETDEV:CISCO-SYSLOG-DOS UDP FloodMinor Denialmedium of ServiceCVE-1999-0063 MS-RPC: DCE-RPCMS-RPC:OF:LOC-SVC-1 WindowsMajor RPC Locatorhigh ServiceCVE-2003-0003 Overflow (1) 6666 HTTP: McAfeeHTTP:STC:MCAFEE:FREESCAN-LEAK FreeScanWarning Info Leak low CVE-2004-0487 10392 WORM: NetSky.VWORM:NETSKY:V-SMTP-PROP SMTPMajor Propagationhigh CVE-2003-0809 8458 SSL: IIS PCT SSL:CPHR-DOSMalformedCritical Cipher DoScritical CVE-2003-0719 8459 Shellcode: DecoderSHELLCODE:ACTIVE:DECODER-1-UDP LoopCritical 1 (UDP) critical HTTP: Open-RealityHTTP:PHP:OPEN-REALITY-XSS-SQLI CrossMajor Site Scriptinghigh and SQL Injection Vulnerabilities48489 DB: IBM DB2DB:DB2:JDBC-OF JDBC AppletMajor Server Overflowhigh CVE-2007-2582 23890 TROJAN: NetTROJAN:NETDEVIL:NETDEVIL-STC Devil InitialMajor Server Responsehigh CVE-1999-0660 MS-RPC: LSASSMS-RPC:LSASS:MAL-OPCODE MaliciousCritical OpCode critical CVE-2003-0533 10108 DOS: HP WebDOS:NETDEV:WEBJET-FRAMEWORK JetAdminMinor Frameworkmedium Disclosure MS-RPC: LSASSMS-RPC:LSASS:OVERSIZED-FRAG DCE-RPCCritical Oversizedcritical Fragment CVE-2003-0533 10108 HTTP: MSWebDVDHTTP:STC:IE:MSWEBDVD-NPA NullWarning Pointer Assignmentlow 10056 WORM: SasserWORM:SASSER:FTP-SRV-OVERFLOW FTP ServerMajor Buffer Overflowhigh AttemptCVE-2003-0533 10108 HTTP: PHP-NukeHTTP:PHP:PHPNUKE:SID-SQL-INJECT Modules.phpMinor SID mediumParameter SQL Injection 10282 CHAT: QQ ConnectionCHAT:QQ:QQ-CONNECT-TCP TCPInfo Fallbackinfo SMB: OutdatedSMB:AUDIT:OLD-VERSION SMB DialectWarning low CVE-2007-5351 26777 HTTP: CA BrightStorHTTP:STC:ACTIVEX:ADDCOLUMN ARCserveMajor Backuphigh AddColumnCVE-2008-1472 ActiveX Buffer28268 Overflow SMB: MicrosoftSMB:NTLM-LOGIN-FAILED WindowsWarning NTLM Loginlow Authorization Failure HTTP: MalformedHTTP:STC:DL:MAL-VISIO MicrosoftMajor Visio Filehigh CVE-2011-0093 46138 HTTP: CommonHTTP:STC:IMG:OFFEND-TG OffensiveInfo Picture (2)info HTTP: CommonHTTP:STC:IMG:OFFEND-GG OffensiveInfo Picture (1)info HTTP: SambarHTTP:OVERFLOW:SAMBAR-SEARCH Server search.plCritical Buffercritical OverflowCVE-2004-2086 9607 P2P: Ares GalaxyP2P:ARES:UDP-PEER-CHECK UDP PeerInfo Check info HTTP: MaliciousHTTP:OVERFLOW:MALICIOUS-HOST Host HeaderMajor high CVE-2006-5478 20655 HTTP: MicrosoftHTTP:STC:ACTIVEX:HXVZ HxTocCtrlMajor ActiveX highControl AccessCVE-2008-1086 28606 HTTP: SQL DECLARE/EXECHTTP:SQL:INJ:DECLARE-EXECMajor Injectionhigh HTTP: phpBBHTTP:PHP:PHPBB:PM-SQL-USER Private MessageWarning Parameterlow SQL CVE-2003-0486Injection 9984 DOS: LinkSysDOS:NETDEV:LINKSYS-GOZILA-DOS2 Cable/DSLMinor Router Gozilamedium sysPasswd Parameter DoS10453 HTTP: CrystalHTTP:DIR:CRYSTAL-REPORTS Reports DirectoryMajor Traversalhigh CVE-2004-0204 10260 HTTP: InternetHTTP:STC:IE:HDRLOC-MSITS ExplorerMajor Arbitrary Codehigh ExecutionCVE-2004-0549 10473 WORM: Mimail.AWORM:MIMAIL:MIMAIL.A AttachmentMajor high WORM: BerbewWORM:BERBEW:KEYLOGGER-UPLOAD KeyloggerMajor Uploadhigh HTTP: ExecutableHTTP:STC:IMG:EXE-IN-IMAGE BinaryMajor Disguised highas Image CVE-2005-0230 12468 HTTP: WinAmpHTTP:STC:WINAMP:CDDA-OF2 IN_CDDA.dllMajor Bufferhigh Overflow (2)CVE-2004-1119 11730 IE: CDO ProtocolHTTP:STC:IE:CDO-IN-HEADER URI inInfo Web Page info CVE-2008-4020 HTTP: ADODB.StreamHTTP:STC:ACTIVEX:ADODB FileMinor Installationmedium Weakness 10514 HTTP: Shell.ApplicationHTTP:STC:ACTIVEX:SHELL-APPMinor File Installationmedium WeaknessCVE-2004-0420 10652 WORM: Bagle.AFWORM:BAGLE:AF-HTTP HTTP MajorTraffic high HTTP: InternetHTTP:STC:IE:JS-LOCATION-ASSIGN ExplorerMinor JavaScript mediumMethod AssignmentCVE-2004-0727 Cross-Domain10689 Scripting HTTP: Axis VideoHTTP:CGI:AXIS-ACCOUNT ServerCritical Remote Accountcritical Addition 11011 SMTP: MS-Outlook:SMTP:OUTLOOK:OBJECT-TAG-XML ObjectMajor Tag withhigh XML ExploitCVE-2003-0809 8565 HTTP: NetgearHTTP:NETGEAR:DG834G-DEBUG-MODE DG834GMinor Wireless Routermedium Debug Mode Command FTP: LukemftpFTP:LUKEMFTP:URG-RELOGIN URG ReloginMajor high CVE-2004-0794 10967 HTTP: File ExtensionHTTP:EXT:FILE-EXT-IN-DIR in MinorDirectory Namemedium APP: TrolltechAPP:TROLLTECH-QT-BMP-OF Qt BMP HandlingMajor Overflowhigh CVE-2004-0691 10977 NNTP: XPATNNTP:OVERFLOW:XPAT-PATTERN Pattern OverflowCritical critical CVE-2004-0574 11379 HTTP: NovellHTTP:NOVELL:WEBACC-MODIFY GroupWiseMinor WebAccessmedium Cross SiteCVE-2009-1635 Scripting Attempt35066 HTTP: osCommerceHTTP:SQL:INJ:OSCOM products_idWarning Parameterlow SQL Injection 9275 HTTP: PHP-NukeHTTP:PHP:PHPNUKE:PRIV-ESC RemoteWarning Priviledgelow Escalation HTTP: PHP-NukeHTTP:PHP:PHPNUKE:VIEWADMIN ViewAdminWarning Page Unauthorizedlow CVE-2004-1932 Access PHP-Nuke DelAdminHTTP:PHP:PHPNUKE:DELADMIN PageWarning Unauthorizedlow Access HTTP: PhpDigHTTP:PHP:PHPDIG-FILE-INC "relative_script_path"Major high Remote FileCVE-2004-0068 Include 9424 HTTP: RealPlayerHTTP:MISC:REAL-RMP-TRAV .RMP MinorFile Directorymedium TraversalCVE-2004-0273 9580 HTTP: InternetHTTP:STC:IE:LOC-SPOOF ExplorerWarning Location Fieldlow SpoofingCVE-2004-2219 HTTP: Axis VideoHTTP:CGI:AXIS-EXEC ServerMajor Remote Commandhigh Execution 11011 HTTP: IIS ASP.NetHTTP:IIS:ASP-DOT-NET-BACKSLASH DirectoryWarning Authenticationlow BypassCVE-2004-0847 11342 HTTP: MicrosoftHTTP:IIS:WEBDAV:XML-HANDLER-DOS WebDAVMinor XML Messagemedium HandlerCVE-2003-0718 Denial of Service11384 HTTP: SilentHTTP:PHP:SILENT-STORM-ADMIN Storm PortalWarning Privilege lowEscalation CVE-2004-1567 11284 HTTP: 3ComHTTP:3COM:LOG-CLEAN 3crwe754g72-aMinor Unauthorizedmedium Log Clearance HTTP: MozillaHTTP:STC:MOZILLA:FIREFLASH FireFox HiddenMinor Framemedium Overlay CVE-2005-0232 HTTP: SQL CommentHTTP:SQL:INJ:COMMENT EvasionMinor in URLmedium HTTP: AdobeHTTP:STC:ADOBE:PDF-UUEXEC Acrobat ReaderMajor uudecode()high File ExecutionCVE-2004-0631 10931 MISC: ConexantMISC:CONEXANT-LOGIN ChipsetMinor DSL Routermedium Default LoginCVE-2004-0680 8765 HTTP: CoolPHPHTTP:PHP:COOLPHP-DIRTRAV "op" ParameterMinor Directorymedium TraversalCVE-2004-1600 11437 HTTP: BlackBoardHTTP:PHP:BLACKBOARD-INC RemoteMajor PHP Codehigh InclusionCVE-2004-1582 11336 APP: RealPlayerAPP:REAL:PLAYER-MAL-META-FILE MaliciousMajor Metafilehigh Download CVE-2004-1481 11309 HTTP: AlexPHPHTTP:PHP:ALEXPHP-INCLUDE RemoteMajor File Inclusionhigh HTTP: vBulletinHTTP:PHP:VBULLETIN-CODE-EXEC

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    149 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us