시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
11,3112015/01/20 2014081  ET WEB_SPECIFIC_APPS Mambo Zorder zorder Parameter INSERT INTO SQL Injection Vulnerability; [1
11,3102015/01/20 2014080  ET WEB_SPECIFIC_APPS Mambo Zorder zorder Parameter UPDATE SET SQL Injection Vulnerability; [1
11,3092015/01/20 2014079  ET WEB_SPECIFIC_APPS Mambo Zorder zorder Parameter UNION SELECT SQL Injection Vulnerability; [1
11,3082015/01/20 2014078  ET WEB_SPECIFIC_APPS jbShop e107 CMS plugin item_id parameter UPDATE SET SQL Injection Attempt; [1
11,3072015/01/20 2014077  ET WEB_SPECIFIC_APPS jbShop e107 CMS plugin item_id parameter INSERT INTO SQL Injection Attempt; [1
11,3062015/01/20 2014076  ET WEB_SPECIFIC_APPS jbShop e107 CMS plugin item_id parameter UNION SELECT SQL Injection Attempt; [1
11,3052015/01/20 2014075  ET WEB_SPECIFIC_APPS jbShop e107 CMS plugin item_id parameter DELETE FROM SQL Injection Attempt; [1
11,3042015/01/20 2014074  ET WEB_SPECIFIC_APPS jbShop e107 CMS plugin item_id parameter SELECT FROM SQL Injection Attempt; [1
11,3032015/01/20 2014073  ET WEB_SPECIFIC_APPS WordPress The-Welcomizer plugin page parameter Cross Site Scripting Attempt; [1
11,3022015/01/20 2014072  ET WEB_SPECIFIC_APPS Pet Listing Script type_id Parameter Cross Site Scripting Attempt; [1
11,3012015/01/20 2014071  ET MALWARE Adware.Gen5 Reporting; [1
11,3002015/01/20 2014070  ET TROJAN Trojan Downloader.Bancos Reporting; [1
11,2992015/01/20 2014069  ET MALWARE Win32-Adware.Hotclip.A Reporting; [1
11,2982015/01/20 2014068  ET WEB_SPECIFIC_APPS Plone and Zope cmd Parameter Remote Command Execution Attempt; [1
11,2972015/01/20 2014067  ET WEB_SPECIFIC_APPS PHP Booking Calendar page_info_message parameter Cross-Site Scripting Vulnerability; [1
11,2962015/01/20 2014066  ET TROJAN Trojan-Clicker.Win32.VB.gnf Reporting; [1
11,2952015/01/20 2014065  ET WEB_SPECIFIC_APPS Joomla com_dshop Component UPDATE SET SQL Injection Attempt;  
11,2942015/01/20 2014064  ET WEB_SPECIFIC_APPS Joomla com_dshop Component INSERT INTO SQL Injection Attempt;  
11,2932015/01/20 2014063  ET WEB_SPECIFIC_APPS Joomla com_dshop Component UNION SELECT SQL Injection Attempt;  
11,2922015/01/20 2014062  ET WEB_SPECIFIC_APPS Joomla com_dshop Component DELETE FROM SQL Injection Attempt;  
11,2912015/01/20 2014061  ET WEB_SPECIFIC_APPS Joomla com_dshop Component SELECT FROM SQL Injection Attempt;  
11,2902015/01/20 2014060  ET MALWARE Tool.InstallToolbar.24 Reporting; [1
11,2892015/01/20 2014059  ET POLICY Spyware.Agent.elbb lava.cn Game Exe Download; [1,2
11,2882015/01/20 2014058  ET DELETED Unknown Loader EXE Payload Request;  
11,2872015/01/20 2014057  ET TROJAN PoisonIvy.Eu5 Keepalive from CnC;  
11,2862015/01/20 2014056  ET TROJAN PoisonIvy.Eu5 Keepalive to CnC;  
11,2852015/01/20 2014055  ET TROJAN Win32/Hilgild!gen.A CnC Communication;  
11,2842015/01/20 2014054  ET CURRENT_EVENTS User-Agent used in Injection Attempts; [1
11,2832015/01/20 2014053  ET CURRENT_EVENTS Blackhole Likely Flash exploit download request score.swf;  
11,2822015/01/20 2014052  ET CURRENT_EVENTS Blackhole Acrobat 1-7 PDF exploit download request 3;  
11,2812015/01/20 2014051  ET DELETED Blackhole Acrobat 8/9.3 PDF exploit download request 3;  
11,2802015/01/20 2014050  ET DELETED Blackhole Rhino Java Exploit request to /content/v1.jar;  
11,2792015/01/20 2014049  ET POLICY Bluecoat Proxy in use;  
11,2782015/01/20 2014048  ET CURRENT_EVENTS Blackhole Exploit Kit Java Rhino Script Engine Remote Code Execution Attempt; [1
11,2772015/01/20 2014047  ET TROJAN Double HTTP/1.1 Header Inbound - Likely Hostile Traffic;  
11,2762015/01/20 2014046  ET WEB_SERVER Generic Web Server Hashing Collision Attack 2; [1,2,3
11,2752015/01/20 2014045  ET WEB_SERVER Generic Web Server Hashing Collision Attack; [1,2,3
11,2742015/01/20 2014044  ET TROJAN SpyEye Checkin version 1.3.25 or later 2;  
11,2732015/01/20 2014043  ET DELETED Potential DNS Request from Trojan.DNSChanger infected system; [1
11,2722015/01/20 2014042  ET DELETED AirOS admin.cgi/css Exploit Attempt; [1,2
11,2712015/01/20 2014041  ET DELETED AirOS .css Worm Outbound Propagation Sweep; [1,2
11,2702015/01/20 2014040  ET TROJAN Win32.PowerPointer checkin;  
11,2692015/01/20 2014039  ET CURRENT_EVENTS MALVERTISING Alureon Malicious IFRAME;  
11,2682015/01/20 2014038  ET CURRENT_EVENTS MALVERTISING OpenX BrowserDetect.init Download;  
11,2672015/01/20 2014037  ET INFO HTTP Request to a *.osa.pl domain;  
11,2662015/01/20 2014036  ET CURRENT_EVENTS DRIVEBY Generic Java Exploit Obfuscated With Allatori;  
11,2652015/01/20 2014035  ET CURRENT_EVENTS DRIVEBY Blackhole PDF Exploit Request /fdp2.php;  
11,2642015/01/20 2014034  ET CURRENT_EVENTS DRIVEBY Generic Java Rhino Scripting Engine Exploit Previously Requested net.class;  
11,2632015/01/20 2014033  ET CURRENT_EVENTS DRIVEBY Generic Java Rhino Scripting Engine Exploit Previously Requested edu.class;  
11,2622015/01/20 2014032  ET CURRENT_EVENTS DRIVEBY Generic Java Rhino Scripting Engine Exploit Previously Requested org.class;  
< 311  312  313  314  315  316  317  318  319  320 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.