<<

IBM Security
    support portal
    technical support
    troubleshooting
IBM Tivoli LCF httpd can be used to remotely access files as root
IBM X-Force: Microsoft ISA Server HTTP header cache poisoning
ICMP port unreachable
identity schemes
    Guillou-Quisquater (GQ)
    Mu-Varadharajan (MV)
    Schnorr (IFF)
ignore response
Information Disclosure
    HTTP_Apache_ServerInfo
    HTTP_Apache_ServerStatus
    HTTP_Apache_Trailing_Slash
    HTTP_Bash_Shell_History
    HTTP_ColdFusion_Debu
    HTTP_FileTypeLnk
    HTTP_FileTypeUrl
    HTTP_FrontPage_Authors
    HTTP_FrontPage_PWD
    HTTP_IIS_Obtain_Code
    HTTP_IIS_Track
    HTTP_IIS_Trailing_Incomplete_Unicode
    HTTP_JSP_SourceRead
    HTTP_Microsoft_Error_Report
    HTTP_Netscape_List_Directories
    HTTP_Netware_DirList
    HTTP_Orion_JSP_SourceRead
    HTTP_Passwd_Txt
    HTTP_PHP_Addslashes_ViewFiles
    HTTP_PHPNuke_Admin_Overwrite
    HTTP_POST_Filename_passwd
    HTTP_POST_Filename_sam
    HTTP_PsaPhp_RevealSource
    HTTP_Server_ID
    HTTP_Tunnel_Not_TLS_or_SSL
    HTTP_Unix_Passwords
    HTTPS_Proxy_Info_Disclosure
    Tivoli_LCF_File_Read
Information Disclosure signatures
Injection attack signatures
Injection Attacks
    HTTP_GET_ComputeSum
    HTTP_GET_CreateTable
    HTTP_GET_GroupBy
    HTTP_GET_SQL_Convert_Int
    HTTP_GET_SQL_OpenRowSet
    HTTP_GET_SQL_Select_Count
    HTTP_GET_SQL_Select_Top_1
    HTTP_GET_SQL_UnionAllSelect
    HTTP_GET_SQL_UnionSelect
    HTTP_GET_SQL_WaitForDelay
    HTTP_GET_XP_Cmdshell
    HTTP_IIS_MSSQL_xml
    HTTP_IIS_MSSQL_XML_Script
    HTTP_POST_ComputeSum
    HTTP_POST_CreateTable
    HTTP_POST_GroupBy
    HTTP_POST_SQL_Convert_Int
    HTTP_POST_SQL_OpenRowSet
    HTTP_POST_SQL_Select_Count
    HTTP_POST_SQL_Select_Top_1
    HTTP_POST_SQL_UnionAllSelect
    HTTP_POST_SQL_UnionSelect
    HTTP_POST_SQL_WaitForDelay
    HTTP_POST_XP_Cmdshell
    HTTP_Shells_C
    HTTP_Shells_Ksh
    HTTP_Shells_Perl
    HTTP_Shells_Perl_Exe
    HTTP_Shells_Rksh
    HTTP_Shells_Sh
    HTTP_Shells_Tcsh
    LDAP_Injection
    Shell_Command_Injection
    SQL_Injection
    SQL_Jet_Query_Overflow
    XPATH_Injection
interface bandwidth
interface list
interface packets
Internet Protocol Flow Information Export (IPFIX)
intrusion prevention updates
IPFIX
IPS Local Management Interface
    compatibility
    IPS Local Management Interface
        compatibility
        supported Java
    supported browsers
IPv6



Java
    actions
    JRE
Java compatibility
JBoss Application Server DeploymentFileRepository directory traversal
JSON_Hijacking



key IDs



LDAP Injection
LDAP_Injection
LEEF (log event extended format)
LEEF log forwarding (syslog)
license and update servers
license key
license servers
licenses
    view license settings
lighttpd mod_fastcgi code execution
lists
log event extended format (LEEF)
log evidence
    behavior
    packet capture file format
    storage directory
logs
    firewall
    security alerts
    system
logs and packet captures



Malicious File Execution
    HTTP_PHP_CRLF_Injection
    HTTP_PHP_Includedir
    HTTP_PHP_Script_Injection
    HTTP_PHP_Transfer_XSS
    HTTP_Server_Side_Include_Injection
Malicious File Execution signatures
management interface
    mDNS Responder Service
management systems
mDNS Responder
memory
message digest algorithm
MIB (management information bases)
MIB file
Microsoft Content Management Server (MCMS) HTTP request cross-site scripting
Microsoft FrontPage Extensions administrators.pwd file could reveal encrypted passwords
Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
Microsoft IIS .htw cross scripting
Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
Microsoft IIS Cross-Site Scripting
Microsoft IIS Hit-highlighting security bypass
Microsoft IIS malformed URL extension data denial of service
Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
Microsoft IIS WebDAV long invalid request denial of service
Microsoft Internet Explorer 3.0 allows remote command execution
Microsoft Internet Explorer 5.5 index.dat file can be used to remotely execute code
Microsoft Internet Explorer HTTPS proxy authentication information disclosure
Microsoft Internet Information Server (IIS) ActivePerl command execution
Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
Microsoft Internet Information Server WebDAV multiple attributes per XML elements cause denial of service
Microsoft Internet Information Services URL parser buffer overflow
Microsoft Jet Database Engine query could execute code
Microsoft SharePoint Server default.aspx PATH_INFO cross-site scripting
Microsoft SQL Server SQLXML ISAPI buffer overflow
Microsoft SQL Server SQLXML XML tag script injection
Microsoft Windows error report transmission detected
Miscellaneous attack signatures
Miscellaneous Attacks
    HTTP_Acunetix_WVS_Scan
    HTTP_Alternates_Corrupt
    HTTP_Connect_Proxy_Bypass_SMTP
    HTTP_Content_Length_Invalid
    HTTP_CRLF_Injection_Response_Splitting
    HTTP_Field_With_Binary
    HTTP_Unknown_Protocol
    HTTP_URLscan
    JSON_Hijacking
modes
    inline protection
    inline simulation
    monitoring
monitor health and statistics
Multiple vendor JavaScript Object Notation information disclosure
Multiple vendor open-source PHP projects could allow remote command execution


>>