sos5.0.0,
sos5.1.0
medium
This signature detects shell attempts to exploit the
dcforum.cgi script in DCScripts DC Forum (all versions),
which is used to manage web-based discussion boards.
Attackers may use maliciously crafted URL requests with
the pipe and newline characters to execute arbitrary scripts
on the Web server.
HTTP:CGI:DCFORUM-AZ-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects access to the FormMail CGI program.
Attackers may use this program to remotely execute
commands.
HTTP:CGI:FORMMAIL-ENV-VAR
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the Hassan shopping cart script shop.cgi. Attackers may
access arbitrary system files.
HTTP:CGI:HASSAN-DIR-TRAVERSAL
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
ht://dig, a Web content search engine for UNIX. Because
ht://dig improperly validates form input, attackers may pass
a maliciously crafted variable to the htsearch CGI script to
read files accessible to the program user.
HTTP:CGI:HTDIG-INCLUSION
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
hsx.cgi, which ships as part of iWeb Hyperseek 2000.
Attackers may view arbitrary files and directories.
HTTP:CGI:HYPERSEEK-DIR-TRAVERSL
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
IkonBoard, a popular Web-based discussion board. Attackers
may send a maliciously crafted cookie that contains illegal
characters to IkonBoard to execute arbitrary code with
IkonBoard privileges (typically user level).
HTTP:CGI:IKONBOARD-BADCOOKIE
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the info2www CGI script. Attackers may execute arbitrary
binaries on the Web server.
HTTP:CGI:INFO2WWW-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the infosrch.cgi script. Attackers may execute commands
on the Web server.
HTTP:CGI:INFOSRCH-REMOTE-EXEC
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
LIB CGI. Attackers may inject maliciously crafted C code into
LIB CGI applications to overwrite the Frame Pointer and
execute arbitrary code on the host.
HTTP:CGI:LIBCGI-RFP-OVERWRITE
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the cached_feed.cgi script provided by moreover.com.
Attackers may view arbitrary system files that are readable
by the HTTPd process.
HTTP:CGI:MOREOVER-CACHE-FEED
sos5.0.0,
sos5.1.0
medium
This signature detects directory traversal attempts that
exploit the main.cgi script in TECH-NOTE 2000. Because
the script validates input incorrectly, attackers may remotely
access arbitrary files from the server.
HTTP:CGI:TECHNOTE-MAIN-DCLSR
Copyright © 2010, Juniper Networks, Inc.
878
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...