sos5.1.0
info
This signature detects the use of Gator, a spyware
application.
HTTP:SPYWARE:GATOR
sos5.1.0
info
This signature detects the use of New.net, a spyware
application.
HTTP:SPYWARE:NEW-DOT-NET
sos5.1.0
medium
This signature detects a SQL command sequence in a URL.
Because SQL commands are not normally used in HTTP
connections, this may indicate a SQL injection attack.
However, it may also be a false positive.
HTTP:SQL:INJECTION:CMD-CHAIN-1
sos5.1.0
high
This signature detects a long SQL command sequence in a
URL. Because SQL commands are not normally used in HTTP
connections, this may indicate a SQL injection attack.
HTTP:SQL:INJECTION:CMD-CHAIN-2
sos5.1.0
low
This signature detects SQL commands within a URL.
Because SQL commands are not normally used in HTTP
connections, this may indicate a SQL injection attack.
However, it may be a false positive.
HTTP:SQL:INJECTION:CMD-IN-URL
sos5.0.0,
sos5.1.0
medium
This signature detects attempts to exploit a vulnerability in
the FactoSystem Content Management System (CMS).
Attackers may introduce instructions into a SQL query to
create a non-authorized CMS account.
HTTP:SQL:INJECTION:FACTO-CMS
sos5.1.0
info
This signature detects specific characters, typically used in
SQL, within an HTTP connection. Because these characters
are not normally used in HTTP, this may indicate a SQL
injection attack. However, it may be a false positive. Some
attempts at Cross Site Scripting attacks will also trigger this
signature.
HTTP:SQL:INJECTION:GENERIC
sos5.0.0,
sos5.1.0
medium
This signature detects directory traversal attempts against
the modules.php script included with PostNuke. PostNuke
versions 0.723 and earlier are vulnerable. Attackers may send
a maliciously crafted request to the modules.php to traverse
the directory structure and execute SQL queries to the
PostNuke database.
HTTP:SQL:INJECTION:POSTNUKE
sos5.1.0,
sos5.1.0
medium
This signature detects SQL injection attempts against a
WebStore2000 server. Attackers may inject SQL code into
the Item_ID parameter of a maliciously crafted request,
enabling them to execute arbitrary SQL commands on the
WebStore2000 server.
HTTP:SQL:INJECTION:WS2000
sos5.1.0
high
This signature detects buffer overflow attempts against
Adobe Acrobat Reader. A malicious HTTP server may host
an Adobe Acrobat file with an overly long extension; when
a client opens this file in Adobe Acrobat Reader, the file
triggers a buffer overflow, enabling the server to execute
arbitrary code on the client.
HTTP:STC:ACROBAT-EXT-OF
sos5.1.0
high
This signature detects a maliciously crafted PDF file
downloaded via HTTP. Attackers may insert certain shell
metacharacters at the beginning of a uuencoded PDF file to
force Adobe Acrobat to execute arbitrary commands upon
loading the file.
HTTP:STC:ACROBAT-UUEXEC
905
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...