Guest User

Untitled

a guest
Aug 29th, 2021
136
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.25 KB | None | 0 0
  1. 921120 HTTP Response Splitting Attack
  2. 921130 HTTP Response Splitting Attack
  3. 921140 HTTP Header Injection Attack via headers
  4. 921150 HTTP Header Injection Attack via payload (CR/LF detected)
  5. 921160 HTTP Header Injection Attack via payload (CR/LF and header-name detected)
  6. 921151 HTTP Header Injection Attack via payload (CR/LF detected)
  7. 930100 Path Traversal Attack (/../)
  8. 930110 Path Traversal Attack (/../)
  9. 930120 OS File Access Attempt
  10. 930130 Restricted File Access Attempt
  11. 931100 Possible Remote File Inclusion (RFI) Attack: URL Parameter using IP Address
  12. 931110 Possible Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used w/URL Payload
  13. 931120 Possible Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark Character (?)
  14. 931130 Possible Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link
  15. 932100 Remote Command Execution: Unix Command Injection
  16. 932105 Remote Command Execution: Unix Command Injection
  17. 932110 Remote Command Execution: Windows Command Injection
  18. 932115 Remote Command Execution: Windows Command Injection
  19. 932120 Remote Command Execution: Windows PowerShell Command Found
  20. 932130 Remote Command Execution: Unix Shell Expression Found
  21. 932140 Remote Command Execution: Windows FOR/IF Command Found
  22. 932150 Remote Command Execution: Direct Unix Command Execution
  23. 932160 Remote Command Execution: Unix Shell Code Found
  24. 932170 Remote Command Execution: Shellshock (CVE-2014-6271)
  25. 932171 Remote Command Execution: Shellshock (CVE-2014-6271)
  26. 932180 Restricted File Upload Attempt
  27. 933100 PHP Injection Attack: PHP Open Tag Found
  28. 933110 PHP Injection Attack: PHP Script File Upload Found
  29. 933120 PHP Injection Attack: Configuration Directive Found
  30. 933130 PHP Injection Attack: Variables Found
  31. 933140 PHP Injection Attack: I/O Stream Found
  32. 933150 PHP Injection Attack: High-Risk PHP Function Name Found
  33. 933151 PHP Injection Attack: Medium-Risk PHP Function Name Found
  34. 933160 PHP Injection Attack: High-Risk PHP Function Call Found
  35. 933170 PHP Injection Attack: Serialized Object Injection
  36. 933180 PHP Injection Attack: Variable Function Call Found
  37. 941100 XSS Attack Detected via libinjection
  38. 941101 XSS Attack Detected via libinjection
  39. 941110 XSS Filter - Category 1: Script Tag Vector
  40. 941120 XSS Filter - Category 2: Event Handler Vector
  41. 941130 XSS Filter - Category 3: Attribute Vector
  42. 941140 XSS Filter - Category 4: Javascript URI Vector
  43. 941150 XSS Filter - Category 5: Disallowed HTML Attributes
  44. 941160 NoScript XSS InjectionChecker: HTML Injection
  45. 941170 NoScript XSS InjectionChecker: Attribute Injection
  46. 941180 Node-Validator Blacklist Keywords
  47. 941190 IE XSS Filters - Attack Detected.
  48. 941200 IE XSS Filters - Attack Detected.
  49. 941210 IE XSS Filters - Attack Detected.
  50. 941220 IE XSS Filters - Attack Detected.
  51. 941230 IE XSS Filters - Attack Detected.
  52. 941240 IE XSS Filters - Attack Detected.
  53. 941250 IE XSS Filters - Attack Detected.
  54. 941260 IE XSS Filters - Attack Detected.
  55. 941270 IE XSS Filters - Attack Detected.
  56. 941280 IE XSS Filters - Attack Detected.
  57. 941290 IE XSS Filters - Attack Detected.
  58. 941300 IE XSS Filters - Attack Detected.
  59. 941310 US-ASCII Malformed Encoding XSS Filter - Attack Detected.
  60. 941320 Possible XSS Attack Detected - HTML Tag Handler
  61. 941330 IE XSS Filters - Attack Detected.
  62. 941340 IE XSS Filters - Attack Detected.
  63. 941350 UTF-7 Encoding IE XSS - Attack Detected.
  64. 942100 SQL Injection Attack Detected via libinjection
  65. 942110 SQL Injection Attack: Common Injection Testing Detected
  66. 942120 SQL Injection Attack: SQL Operator Detected
  67. 942140 SQL Injection Attack: Common DB Names Detected
  68. 942150 SQL Injection Attack
  69. 942160 Detects blind sqli tests using sleep() or benchmark().
  70. 942170 Detects SQL benchmark and sleep injection attempts including conditional queries
  71. 942180 Detects basic SQL authentication bypass attempts 1/3
  72. 942190 Detects MSSQL code execution and information gathering attempts
  73. 942200 Detects MySQL comment-/space-obfuscated injections and backtick termination
  74. 942210 Detects chained SQL injection attempts 1/2
  75. 942220 Looking for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 is the "magic number" crash
  76. 942230 Detects conditional SQL injection attempts
  77. 942240 Detects MySQL charset switch and MSSQL DoS attempts
  78. 942250 Detects MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections
  79. 942260 Detects basic SQL authentication bypass attempts 2/3
  80. 942270 Looking for basic sql injection. Common attack string for mysql, oracle and others.
  81. 942280 Detects Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts
  82. 942290 Finds basic MongoDB SQL injection attempts
  83. 942300 Detects MySQL comments, conditions and ch(a)r injections
  84. 942310 Detects chained SQL injection attempts 2/2
  85. 942320 Detects MySQL and PostgreSQL stored procedure/function injections
  86. 942330 Detects classic SQL injection probings 1/3
  87. 942340 Detects basic SQL authentication bypass attempts 3/3
  88. 942350 Detects MySQL UDF injection and other data/structure manipulation attempts
  89. 942360 Detects concatenated basic SQL injection and SQLLFI attempts
  90. 942361 Detects basic SQL injection based on keyword alter or union
  91. 942370 Detects classic SQL injection probings 2/3
  92. 942380 SQL Injection Attack
  93. 942390 SQL Injection Attack
  94. 942400 SQL Injection Attack
  95. 942410 SQL Injection Attack
  96. 942430 Restricted SQL Character Anomaly Detection (args): # of special characters exceeded (12)
  97. 942440 SQL Comment Sequence Detected.
  98. 942450 SQL Hex Encoding Identified
  99. 942470 SQL Injection Attack
  100. 942480 SQL Injection Attack
  101. 943100 Possible Session Fixation Attack: Setting Cookie Values in HTML
  102. 943110 Possible Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer
  103. 943120 Possible Session Fixation Attack: SessionID Parameter Name with No Referer
  104. 944100 Remote Command Execution: Suspicious Java class detected
  105. 944110 Remote Command Execution: Java process spawn (CVE-2017-9805)
  106. 944120 Remote Command Execution: Java serialization (CVE-2015-5842)
  107. 944130 Suspicious Java class detected
  108. 944200 Magic bytes Detected, probable java serialization in use
  109. 944210 Magic bytes Detected Base64 Encoded, probable java serialization in use
  110. 944240 Remote Command Execution: Java serialization (CVE-2015-5842)
  111. 944250 Remote Command Execution: Suspicious Java method detected
  112.  
Add Comment
Please, Sign In to add comment