署名
| Cisco IPS 4240
| IBM Proventia GX4004
| Stonegate IPS 1060
|
ICMPネットワークスイープw /アドレス 仮面
| +
| +
| +
|
タイムスタンプ付きのICMPネットワークスイープ
| +
| +
| +
|
Microsoft Windows CIFS クライアント側のバッファオーバーフロー(CVE-2011-0654)
| +
| -
| -
|
SNMPプロトコル違反 (CVE-2002-0012、CVE-2002-0013)
| +
| -
| -
|
UPnP位置のオーバーフロー
| +
| -
| -
|
無効なDHCPパケット(CVE-2004-1111)
| +
| -
| -
|
TCPセグメントの上書き
| +
| -
| -
|
DHCPクライアントDoS(CVE-2008-0084)
| +
| -
| -
|
TCP MSSが最大値を超えています
| +
| -
| -
|
HTTPリクエストのSQLクエリ (CVE-2005-4643、CVE-2006-0581)
| +
| -
| -
|
Email_Calendar_Code_Exec (CVE-2007-0039)
| -
| +
| -
|
Email_Mime_Filename_Overflow (CVE-1999-0004)
| -
| +
| -
|
Email_Mime_Name_Overflow
| -
| +
| -
|
HTML_UTF8_Overflow(CVE-2006-2382)
| -
| +
| -
|
HTTP_CheckPoint_FW1_FormatString (CVE-2004-0039)
| -
| +
| -
|
Image_JPEG_IE_Component_Overflow (CVE-2005-2308)
| -
| +
| -
|
OTF_Windows_Cmap_Table_Corruption (CVE-2010-3959)
| -
| +
| -
|
PsExec_Service_Accessed
| -
| +
| -
|
PsExec_Installed
| -
| +
| -
|
Script_IE_Improper_Ref_Counting (CVE-2012-4787)
| -
| +
| -
|
SMB_Empty_Password
| -
| +
| -
|
BackOrifice_Ping(CVE-1999-0660)
| -
| +
| -
|
Email_Executable_Extension
| -
| +
| -
|
Flash_NavigateToURL_XSS(CVE-2007-6244)
| -
| +
| -
|
HTTP_Connect_Proxy_Bypass_SMTP
| -
| +
| -
|
HTTP_Field_With_Binary
| -
| +
| -
|
HTTP_Proxy_Cache_Poisoning (CVE-2005-1215)
| -
| +
| -
|
HTTP_URL_repeated_char
| -
| +
| -
|
HTTPS_Proxy_Info_Disclosure (CVE-2005-2830)
| -
| +
| -
|
ICMP_Flood
| -
| +
| -
|
Ping_sweep
| -
| +
| -
|
Smurf_Attack(CVE-1999-0513)
| -
| +
| -
|
SNMP_Default_Backdoor(CVE-2000-0147)
| -
| +
| -
|
TCP_Port_Scan
| +
| +
| +
|
UDP_Port_Scan
| +
| +
| +
|
DNS_Version_Request
| -
| +
| -
|
HTTP_Authentication
| -
| +
| -
|
HTTP_Microsoft_Error_Report
| -
| +
| -
|
ICMP_Subnet_Mask_Request
| +
| +
| +
|
ICMP_Timestamp_Request
| +
| +
| +
|
ASN.1_Oversize-Block
| -
| -
| +
|
HTTP_CRL-Excessively-Long-Options-Request-Argument (CVE-2010-0361)
| -
| -
| +
|
SMTP_CS-Novell-Groupwise-Client-Img-Tag-Src-Parameter-Buffer-Overflow (CVE-2007-6435)
| -
| -
| +
|
MSRPC-TCP_CPS-Samba-Spoolss-RPC-SmbIoNotifyOptionTypeData-Request-Handling-BOF (CVE-2007-2446)
| -
| -
| +
|
SMB-TCP_Negotiate-Protocol-Smb2-Remote-Code-Execution (CVE-2009-3103)
| -
| -
| +
|
File-OLE_Microsoft-Excel-File-Handling-Code-Execution-Vulnerability (CVE-2008-0081)
| -
| -
| +
|
File-OLE_Microsoft-VBA6-Stack-Memory-Corruption (CVE-2010-0815)
| -
| -
| +
|
ファイル-OLE_Microsoft-WordPad-Text-Converter-CVE-2010-2563
| -
| -
| +
|
ファイル-OLE_Microsoft-WordPad-Text-Converter-Buffer-Overflow (CVE-2010-1900)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Graphic-Object-Deref-Vulnerability-CVE-2011-0977
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Word-Sprmcmajority-Record-Buffer-Overflow
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Heap-Overflow-Vulnerability-CVE-2011-0098
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Style-Record-Data-Handling-Code-Execution (CVE-2008-0114)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Merge-Cell-Record-Pointer-CVE-2010-3237
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Art-Property-Table-Memory-Corruption (CVE-2008-0114)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Drawing-Exception-Handling-CVE-2010-3335
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Table-Record-Parsing-Code-Execution (CVE-2010-3232)
| -
| -
| +
|
ファイル-OLE_Microsoft-Graphics-Rendering-Engine-Thumbnail-Stack-Buffer-Overflow (CVE-2010-3970)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Malformed-Records-Stack-Buffer-Overflow (CVE-2009-0559)
| -
| -
| +
|
File-OLE_Microsoft-Office-Excel-Unexpected-Field-Value-Memory-Corruption (CVE-2009-0560)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-バージョン情報-処理コード-実行 (CVE-2010-0262)
| -
| -
| +
|
ファイル-OLE_Microsoft-Word-ファイル-情報-メモリ-破損-MS09-068 (CVE-2009-2135)
| -
| -
| +
|
File-OLE_Microsoft-Excel-Conditional-Formatting-Values-Handling-Code-Execution (CVE-2008-0117)
| -
| -
| +
|
File-OLE_Autonomy-Keyview-Excel-File-Sst-Parsing-Integer-Overflow
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Frtwrapper-Record-Buffer-Overflow (CVE-2008-3471)
| -
| -
| +
|
File-OLE_Microsoft-Excel-Named-Graph-Record-Parsing-Stack-Overflow (CVE-2007-0215)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Remote-Code-Execution-CVE-2009-3134
| -
| -
| +
|
File-OLE_Microsoft-Excel-Use-After-Free-WriteAV-Vulnerability (CVE-2011-1986)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Array-Indexing-Vulnerability-CVE-2011-1990
| -
| -
| +
|
File-OLE_Microsoft-Excel-Conditional-Expression-Parsing-Vulnerability (CVE-2011-1989)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Malformed-Fngroupcount-Value-Code-Execution (CVE-2006-1308)
| -
| -
| +
|
File-OLE_Microsoft-Excel-Sst-Invalid-Length-Use-After-Free (CVE-2012-1887)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Memory-Corruption-CVE-2012-1886
| -
| -
| +
|
File-Binary_Oracle-Java-Runtime-CMM-Readmabcurvedata-Buffer-Overflow (CVE-2010-0838)
| -
| -
| +
|
ファイル-MPEG_Microsoft-DirectShow-QuickTime-Movie-Parsing-Code-Execution (CVE-2009-1537)
| -
| -
| +
|
File-Binary_IBM-Lotus-Notes-1-2-3-Work-Sheet-File-Viewer-Buffer-Overflow
| -
| -
| +
|
File-Text_Mozilla-Firefox-Multiple-URI-Handlers-Command-Execution (CVE-2007-4041、CVE-2007-3896)
| -
| -
| +
|
File-Binary_Adobe-Reader-Security-Bypass-CVE-2013-0624
| -
| -
| +
|
File-Text_Microsoft-Internet-Explorer-Object-Reference-Count-Memory-Corruption (CVE-2007-3902)
| -
| -
| +
|
File-Text_Microsoft-Internet-Explorer-Virtual-Function-Table-Memory-Corruption (CVE-2011-2001)
| -
| -
| +
|
File-Text_Microsoft-Internet-Explorer-HTML-Layout-CVE-2012-0011
| -
| -
| +
|
HTTP_Reply-Chunked-Encoded-Chunk-Unparseable
| -
| -
| +
|
TCP_Segment-Content-Conflict
| -
| -
| +
|
TCP_Window-Shrinked
| -
| -
| +
|
Shared_CS-x86-X41nop-Shellcode
| -
| -
| +
|
Shared_SS-x86-X41nop-Shellcode
| -
| -
| +
|
HTTP_CSU-Potential-Dot-Dot-Slash-Directory-Traversal
| -
| -
| +
|
HTTP_CRL-Microsoft-ASP.NET-ViewState-Denial-Of-Service
| -
| -
| +
|
HTTP_CRL-Php-Quot-Print-Encode-Heap-Buffer-Overflow
| -
| -
| +
|
SMB-TCP_Samba-Authentication-Bypass
| -
| -
| +
|
SMB-TCP_MS-Windows-Print-Spooler-Service-Format-String-Vulnerability (CVE-2010-2563)
| -
| -
| +
|
SNMP-UDP_Default-Community-String-Accepted
| -
| -
| +
|
MSRPC_SS-Sourcefire-Snort-Rule20275eval-Buffer-Overflow
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Linked-List-Corruption-Vulnerability-CVE-2011-0979
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Memory-Heap-Overwrite-Vulnerability-CVE-2011-1275
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-PowerPoint-FB1h-Parsing-BOF-CVE-2010-2572
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-SxView-SXStreamID-CVE-2010-1245
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Malformed-Object-Record-Parsing-Code-Execution (CVE-2009-0557)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Malformed-LBL-Record-Memory-Corruption (CVE-2009-0558)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-Colinfo-Record-Buffer-Overflow (CVE-2006-3875)
| -
| -
| +
|
File-OLE_OpenOffice-OLE-File-Stream-Buffer-Overflow (CVE-2008-0320)
| -
| -
| +
|
File-OLE_Microsoft-Excel-Malformed-Selection-Record-Code-Execution (CVE-2006-1301)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-ファイル-Obj-Record-Memory-Corruption (CVE-2008-4264)
| -
| -
| +
|
ファイル-OLE_Microsoft-PowerPoint-OfficeArt-Shape-RCE-脆弱性 (CVE-2011-3413)
| -
| -
| +
|
ファイル-OLE_Microsoft-Excel-MergeCells-Record-Heap-Overflow-Vulnerability (CVE-2012-0185)
| -
| -
| +
|
ファイル-OLE_Microsoft-Office-Excel-Publisher-Record-Memory-Corruption (CVE-2010-1250)
| -
| -
| +
|
File-Text_x86-X41nop-Shellcode
| -
| -
| +
|
HTTP_Reply-Content-Type-Missing
| -
| -
| +
|
UDP_Checksum-Mismatch
| -
| -
| +
|
E-Mail_IMF-Multipart-Delimiter-Use-Invalid
| -
| -
| +
|
E-Mail_IMF-Base64-Length-Inconsistency
| -
| -
| +
|
IP_Checksum-Mismatch
| -
| -
| +
|
DNS_Client-Name-Bad-Label-Type
| -
| -
| +
|
DNS_Client-Class-Unknown
| -
| -
| +
|
TCP_Segment-SYN-Unexpected
| -
| -
| +
|
TCP_Segment-SYN-ACK-Unexpected
| -
| -
| +
|
E-Mail_IMF-Too-Long-Header
| -
| -
| +
|
E-Mail_IMF-Too-Long-Header-Field
| -
| -
| +
|
POP3_Server-Syntax-Error
| -
| -
| +
|
E-Mail_Message-Syntax-Error
| -
| -
| +
|
E-Mail_Content-Transfer-Encoding-Duplicate
| -
| -
| +
|
SMTP_Unknown-Command
| -
| -
| +
|
HTTP_IIS-Unicode-Encoding
| -
| -
| +
|
HTTP_Version-Varies
| -
| -
| +
|
HTTP_Request-Extra-Data
| -
| -
| +
|
TCP_Segment-SYN-ISN-Mismatch
| -
| -
| +
|
DNS-UDP_Nameserver-Version-Query
| -
| -
| +
|
HTTP_CS-Long-HTTP-Authorization-Negotiate-Token
| -
| -
| +
|
HTTP_CSU-Windows-Style-Absolute-Path-In-URI
| -
| -
| +
|
MSRPC-TCP_CPS-Windows-Local-Security-Authority-Username-Disclosure
| -
| -
| +
|
SNMP-UDP_Linux-Kernel-SNMP-NAT-Helper-SNMP-Decode-DoS-2
| -
| -
| +
|
SNMP-UDP_Default-Community-String-Rejected
| -
| -
| +
|
File-Binary_Windows-LNK-File-Transfer
| -
| -
| +
|
HTTP_SHS-HTTP-0.9-Response-After-HTTP-1.0-Request
| -
| -
| +
|
HTTP_SHS-Content-After-Zero-Content-Length
| -
| -
| +
|
File-PNG_Conflicting-Content-Type-Text
| -
| -
| +
|
File-PNG_Conflicting-Content-Type-Text-Plain
| -
| -
| +
|