| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 11,961 | 2015/01/20 | 2014770 | ET WEB_SPECIFIC_APPS WordPress Download Monitor plugin uploader.php Cross-Site Scripting Attempt; [1] |
| 11,960 | 2015/01/20 | 2014769 | ET WEB_SPECIFIC_APPS WordPress CataBlog plugin category Cross-Site Scripting Attempt; [1] |
| 11,959 | 2015/01/20 | 2014768 | ET WEB_SPECIFIC_APPS WordPress WP Survey and Quiz Tool plugin rowcount Cross-Site Scripting Attempt; [1] |
| 11,958 | 2015/01/20 | 2014767 | ET MALWARE Win32.Bublik.B/Birele/Variant.Kazy.66443 Checkin; |
| 11,957 | 2015/01/20 | 2014766 | ET ACTIVEX Possible Windows Live Writer ActiveX BlogThisLink Method Access Denail of Service Attack 2; [1] |
| 11,956 | 2015/01/20 | 2014765 | ET ACTIVEX Possible Windows Live Writer ActiveX BlogThisLink Method Access Denail of Service Attack; [1] |
| 11,955 | 2015/01/20 | 2014764 | ET ACTIVEX Possible Chilkat Software FTP2 ActiveX Component GetFile Access Remote Code Execution 2; [1] |
| 11,954 | 2015/01/20 | 2014763 | ET ACTIVEX Possible Chilkat Software FTP2 ActiveX Component GetFile Access Remote Code Execution; [1] |
| 11,953 | 2015/01/20 | 2014762 | ET TROJAN W32/SpyBanker Infection Confirmation Email 2; |
| 11,952 | 2015/01/20 | 2014761 | ET POLICY Internal Host Getting External IP Address - ip2city.asp; |
| 11,951 | 2015/01/20 | 2014760 | ET TROJAN W32/Votwup.Backdoor Checkin; |
| 11,950 | 2015/01/20 | 2014759 | ET TROJAN Trojan.BAT.Qhost Response from Controller; |
| 11,949 | 2015/01/20 | 2014758 | ET TROJAN Trojan.BAT.Qhost - SET; |
| 11,948 | 2015/01/20 | 2014757 | ET TROJAN Win32/Comrerop Checkin to FTP server; |
| 11,947 | 2015/01/20 | 2014756 | ET POLICY Logmein.com/Join.me SSL Remote Control Access; |
| 11,946 | 2015/01/20 | 2014755 | ET TROJAN W32/HupigonUser.Backdoor Rabclib UA Checkin; |
| 11,945 | 2015/01/20 | 2014754 | ET TROJAN W32/Mepaow.Backdoor Initial Checkin to Intermediary Pre-CnC; [1,2] |
| 11,944 | 2015/01/20 | 2014753 | ET DELETED probable malicious Glazunov Javascript injection; |
| 11,943 | 2015/01/20 | 2014752 | ET TROJAN Win32.HLLW.Autoruner USA_Load UA; [1] |
| 11,942 | 2015/01/20 | 2014751 | ET CURRENT_EVENTS Nuclear/Safe/CritX/FlashPack - Java Request - 32char hex-ascii; |
| 11,941 | 2015/01/20 | 2014750 | ET CURRENT_EVENTS Incognito/RedKit Exploit Kit vulnerable Java payload request to /1digit.html; |
| 11,940 | 2015/01/20 | 2014749 | ET CURRENT_EVENTS Redkit Java Exploit request to /24842.jar; |
| 11,939 | 2015/01/20 | 2014748 | ET DELETED RedKit Repeated Exploit Request Pattern; [1,2,3,4] |
| 11,938 | 2015/01/20 | 2014747 | ET DELETED Blackhole Try Prototype Catch May 14 2012; |
| 11,937 | 2015/01/20 | 2014746 | ET DELETED Blackhole Java Exploit request to /Set.jar; |
| 11,936 | 2015/01/20 | 2014745 | ET DELETED Blackhole Try Prototype Catch May 11 2012; |
| 11,935 | 2015/01/20 | 2014744 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdOpen Method Access Buffer Overflow 2; [1] |
| 11,934 | 2015/01/20 | 2014743 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdOpen Method Access Buffer Overflow; [1] |
| 11,933 | 2015/01/20 | 2014742 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdImport Method Access Buffer Overflow 2; [1] |
| 11,932 | 2015/01/20 | 2014741 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdImport Method Access Buffer Overflow; [1] |
| 11,931 | 2015/01/20 | 2014740 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdExport Method Access Buffer Overflow 2; [1] |
| 11,930 | 2015/01/20 | 2014739 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdExport Method Access Buffer Overflow; [1] |
| 11,929 | 2015/01/20 | 2014738 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdSave Method Access Buffer Overflow 2; [1] |
| 11,928 | 2015/01/20 | 2014737 | ET ACTIVEX Potential ThreeDify Designer ActiveX Control cmdSave Method Access Buffer Overflow; [1] |
| 11,927 | 2015/01/20 | 2014736 | ET WEB_SPECIFIC_APPS Andromeda Streaming MP3 Server andromeda.php Cross-Site Scripting Attempt; [1] |
| 11,926 | 2015/01/20 | 2014735 | ET MALWARE Malicious file bitdefender_isecurity.exe download; |
| 11,925 | 2015/01/20 | 2014734 | ET P2P BitTorrent - Torrent File Downloaded; |
| 11,924 | 2015/01/20 | 2014733 | ET TROJAN Snap Bot Receiving DDoS Command; [1] |
| 11,923 | 2015/01/20 | 2014732 | ET TROJAN Snap Bot Receiving Download Command; [1] |
| 11,922 | 2015/01/20 | 2014731 | ET TROJAN Snap Bot Checkin; [1] |
| 11,921 | 2015/01/20 | 2014730 | ET DELETED Potential FAKEAV Download a-f0-9 x16 download; |
| 11,920 | 2015/01/20 | 2014729 | ET CURRENT_EVENTS FakeAV Landing Page - Viruses were found; |
| 11,919 | 2015/01/20 | 2014728 | ET TROJAN Smoke Loader Checkin r=gate; |
| 11,918 | 2015/01/20 | 2014727 | ET POLICY Outdated Mac Flash Version; |
| 11,917 | 2015/01/20 | 2014726 | ET POLICY Outdated Windows Flash Version IE; [1] |
| 11,916 | 2015/01/20 | 2014725 | ET CURRENT_EVENTS Possible Request for Blackhole Exploit Kit Landing Page - src.php?case=; |
| 11,915 | 2015/01/20 | 2014724 | ET DELETED Blackhole Java Exploit request to /Cal.jar; |
| 11,914 | 2015/01/20 | 2014723 | ET TROJAN Suspicious lcon http header in response seen with Medfos/Midhos downloader; |
| 11,913 | 2015/01/20 | 2014722 | ET TROJAN Medfos/Midhos Checkin; |
| 11,912 | 2015/01/20 | 2014721 | ET TROJAN Boatz Checkin; [1] |
| < 301 302 303 304 305 306 307 308 309 310 > |