|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 8,811 | 2015/01/20 | 2011251 | ET ACTIVEX FathFTP ActiveX Control GetFromURL Method Buffer Overflow Attempt; [1,2] | 8,810 | 2015/01/20 | 2011250 | ET ACTIVEX Image22 ActiveX DrawIcon Method Buffer Overflow Attempt; [1,2] | 8,809 | 2015/01/20 | 2011249 | ET ACTIVEX RSP MP3 Player OCX ActiveX OpenFile Method Buffer Overflow Attempt; [1,2,3] | 8,808 | 2015/01/20 | 2011248 | ET MALWARE User-Agent (XieHongWei-HttpDown/2.0); [1] | 8,807 | 2015/01/20 | 2011247 | ET MALWARE Likely Hostile User-Agent (Forthgoer); [1] | 8,806 | 2015/01/20 | 2011246 | ET WEB_CLIENT Likely Malicious PDF Containing StrReverse; [1] | 8,805 | 2015/01/20 | 2011245 | ET WEB_CLIENT PDF Containing Windows Commands Downloaded; [1] | 8,804 | 2015/01/20 | 2011244 | ET WEB_SERVER Bot Search RFI Scan (ByroeNet/Casper-Like sun4u); [1,2] | 8,803 | 2015/01/20 | 2011243 | ET WEB_SERVER Bot Search RFI Scan (ByroeNet/Casper-Like, planetwork); [1,2] | 8,802 | 2015/01/20 | 2011242 | ET EXPLOIT Possible VLC Media Player M3U File FTP URL Processing Stack Buffer Overflow Attempt; [1,2] | 8,801 | 2015/01/20 | 2011241 | ET EXPLOIT M3U File Request Flowbit Set; [1] | 8,800 | 2015/01/20 | 2011240 | ET WEB_CLIENT Mozilla Firefox Window.Open Document URI Spoofing Attempt; [1,2,3] | 8,799 | 2015/01/20 | 2011239 | ET DELETED Possible Microsoft Windows Shortcut LNK File Automatic File Execution Attempt Via WebDAV; [1,2,3,4] | 8,798 | 2015/01/20 | 2011238 | ET MALWARE User-Agent (Mozilla/4.0 (SP3 WINLD)); [1] | 8,797 | 2015/01/20 | 2011236 | ET TROJAN Trojan-Downloader Win32.Genome.avan; [1] | 8,796 | 2015/01/20 | 2011235 | ET EXPLOIT Possible Novell Groupwise Internet Agent CREATE Verb Stack Overflow Attempt; [1,2,3,4] | 8,795 | 2015/01/20 | 2011234 | ET TROJAN Cosmu Process Dump Report; [1] | 8,794 | 2015/01/20 | 2011233 | ET DELETED Troxen GetSpeed Request; [1,2] | 8,793 | 2015/01/20 | 2011232 | ET P2P p2p Related User-Agent (eChanblard); [1] | 8,792 | 2015/01/20 | 2011231 | ET DELETED MALVERTISING client requesting redirect to drive by - .php?c=cust; [1] | 8,791 | 2015/01/20 | 2011230 | ET DELETED MALVERTISING client requesting drive by - /x/?src=; [1] | 8,790 | 2015/01/20 | 2011229 | ET MALWARE User-Agent (Suggestion); [1] | 8,789 | 2015/01/20 | 2011228 | ET DELETED Trojan.StartPage activity; [1] | 8,788 | 2015/01/20 | 2011227 | ET POLICY User-Agent (NSIS_Inetc (Mozilla)) - Sometimes used by hostile installers; [1] | 8,787 | 2015/01/20 | 2011226 | ET MALWARE Sogou Toolbar Checkin; [1] | 8,786 | 2015/01/20 | 2011225 | ET POLICY Suspicious User Agent (AskInstallChecker); [1] | 8,785 | 2015/01/20 | 2011224 | ET DELETED Malvertising drive by kit collecting browser info; [1] | 8,784 | 2015/01/20 | 2011223 | ET CURRENT_EVENTS Malvertising drive by kit encountered - Loading...; [1] | 8,783 | 2015/01/20 | 2011222 | ET DELETED Malvertising drive by kit encountered - bmb cookie; [1] | 8,782 | 2015/01/20 | 2011221 | ET DELETED FakeAV Served To Client; [1] | 8,781 | 2015/01/20 | 2011220 | ET DELETED Executable requested from /wp-content/languages; [1,2] | 8,780 | 2015/01/20 | 2011219 | ET WEB_SPECIFIC_APPS Campsite article_id Parameter UPDATE SET SQL Injection Attempt; [1,2] | 8,779 | 2015/01/20 | 2011218 | ET WEB_SPECIFIC_APPS Campsite article_id Parameter INSERT INTO SQL Injection Attempt; [1,2] | 8,778 | 2015/01/20 | 2011217 | ET WEB_SPECIFIC_APPS Campsite article_id Parameter UNION SELECT SQL Injection Attempt; [1,2] | 8,777 | 2015/01/20 | 2011216 | ET WEB_SPECIFIC_APPS Campsite article_id Parameter DELETE FROM SQL Injection Attempt; [1,2] | 8,776 | 2015/01/20 | 2011215 | ET WEB_SPECIFIC_APPS Campsite article_id Parameter SELECT FROM SQL Injection Attempt; [1,2] | 8,775 | 2015/01/20 | 2011214 | ET WEB_SPECIFIC_APPS ArdeaCore pathForArdeaCore Parameter Remote File Inclusion Attempt; [1,2,3] | 8,774 | 2015/01/20 | 2011213 | ET ACTIVEX Consona Products SdcUser.TgConCtl ActiveX Control BOF Function Call; [1,2,3] | 8,773 | 2015/01/20 | 2011212 | ET ACTIVEX Consona Products SdcUser.TgConCtl ActiveX Control Buffer Overflow Attempt; [1,2,3] | 8,772 | 2015/01/20 | 2011211 | ET ACTIVEX AtHocGov IWSAlerts ActiveX Control Buffer Overflow Function Call Attempt; [1,2,3] | 8,771 | 2015/01/20 | 2011210 | ET ACTIVEX ComponentOne VSFlexGrid ActiveX Control Archive Method Buffer Overflow Attempt; [1,2] | 8,770 | 2015/01/20 | 2011209 | ET WEB_SPECIFIC_APPS ClearSite device_admin.php cs_base_path Parameter Remote File Inclusion Attempt; [1,2] | 8,769 | 2015/01/20 | 2011208 | ET WEB_SPECIFIC_APPS SaschArt SasCam Webcam Server ActiveX Buffer Overflow Function Call; [1,2] | 8,768 | 2015/01/20 | 2011207 | ET ACTIVEX SaschArt SasCam Webcam Server ActiveX Control Head Method Buffer Overflow Attempt; [1,2] | 8,767 | 2015/01/20 | 2011206 | ET ACTIVEX AVTECH Software ActiveX Buffer Overflow Function Call; [1,2,3] | 8,766 | 2015/01/20 | 2011205 | ET ACTIVEX AVTECH Software ActiveX _DownloadPBControl Method Buffer Overflow Attempt; [1,2,3] | 8,765 | 2015/01/20 | 2011204 | ET ACTIVEX AVTECH Software ActiveX _DownloadPBClose Method Buffer Overflow Attempt; [1,2,3] | 8,764 | 2015/01/20 | 2011203 | ET ACTIVEX AVTECH Software ActiveX _DownloadPBOpen Method Buffer Overflow Attempt; [1,2,3] | 8,763 | 2015/01/20 | 2011202 | ET ACTIVEX AVTECH Software ActiveX Snapshot Method Buffer Overflow Attempt; [1,2,3] | 8,762 | 2015/01/20 | 2011201 | ET ACTIVEX AVTECH Software ActiveX Login Method Buffer Oveflow Attempt; [1,2,3] | < 361 362 363 364 365 366 367 368 369 370 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|