sos5.0.0,
sos5.1.0
medium
This signature detects shell attempts to exploit the
dcforum.cgi script in DCScripts DC Forum (all versions),
which is used to manage web-based discussion boards.
Attackers may use maliciously crafted URL requests with
the pipe and newline characters to execute arbitrary scripts
on the Web server.
HTTP:CGI:DCFORUM-AZ-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects access to the FormMail CGI program.
Attackers may use this program to remotely execute
commands.
HTTP:CGI:FORMMAIL-ENV-VAR
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the Hassan shopping cart script shop.cgi. Attackers may
access arbitrary system files.
HTTP:CGI:HASSAN-DIR-TRAVERSAL
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
ht://dig, a Web content search engine for UNIX. Because
ht://dig improperly validates form input, attackers may pass
a maliciously crafted variable to the htsearch CGI script to
read files accessible to the program user.
HTTP:CGI:HTDIG-INCLUSION
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
hsx.cgi, which ships as part of iWeb Hyperseek 2000.
Attackers may view arbitrary files and directories.
HTTP:CGI:HYPERSEEK-DIR-TRAVERSL
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
IkonBoard, a popular Web-based discussion board. Attackers
may send a maliciously crafted cookie that contains illegal
characters to IkonBoard to execute arbitrary code with
IkonBoard privileges (typically user level).
HTTP:CGI:IKONBOARD-BADCOOKIE
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the info2www CGI script. Attackers may execute arbitrary
binaries on the Web server.
HTTP:CGI:INFO2WWW-EXEC
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the infosrch.cgi script. Attackers may execute commands
on the Web server.
HTTP:CGI:INFOSRCH-REMOTE-EXEC
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
LIB CGI. Attackers may inject maliciously crafted C code into
LIB CGI applications to overwrite the Frame Pointer and
execute arbitrary code on the host.
HTTP:CGI:LIBCGI-RFP-OVERWRITE
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the cached_feed.cgi script provided by moreover.com.
Attackers may view arbitrary system files that are readable
by the HTTPd process.
HTTP:CGI:MOREOVER-CACHE-FEED
sos5.0.0,
sos5.1.0
medium
This signature detects directory traversal attempts that
exploit the main.cgi script in TECH-NOTE 2000. Because
the script validates input incorrectly, attackers may remotely
access arbitrary files from the server.
HTTP:CGI:TECHNOTE-MAIN-DCLSR
Copyright © 2010, Juniper Networks, Inc.
888
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...