시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,7112015/01/20 2010044  ET WEB_SPECIFIC_APPS Joomla! CB Resume Builder 'group_id' Parameter UPDATE SET SQL Injection; [1,2
7,7102015/01/20 2010043  ET WEB_SPECIFIC_APPS Joomla! CB Resume Builder 'group_id' Parameter INSERT INTO SQL Injection; [1,2
7,7092015/01/20 2010042  ET WEB_SPECIFIC_APPS Joomla! CB Resume Builder 'group_id' Parameter UNION SELECT SQL Injection; [1,2
7,7082015/01/20 2010041  ET WEB_SPECIFIC_APPS Joomla! CB Resume Builder 'group_id' Parameter DELETE FROM SQL Injection; [1,2
7,7072015/01/20 2010040  ET WEB_SPECIFIC_APPS Joomla! CB Resume Builder 'group_id' Parameter SELECT FROM SQL Injection; [1,2
7,7062015/01/20 2010039  ET ACTIVEX Possible AOL SuperBuddy ActiveX Control Remote Code Execution Attempt; [1,2,3
7,7052015/01/20 2010038  ET WEB_SERVER Possible INTO OUTFILE Arbitrary File Write SQL Injection In Cookie; [1,2,3,4
7,7042015/01/20 2010037  ET WEB_SERVER Possible SQL Injection INTO OUTFILE Arbitrary File Write Attempt; [1,2,3,4
7,7032015/01/20 2010036  ET ACTIVEX Possible EMC Captiva PixTools Distributed Imaging ActiveX Control Vulnerable SetLogLevel/SetLogFileName Method Arbitrary File Creation/Overwrite Attempt; [1,2,3
7,7022015/01/20 2010035  ET ACTIVEX Possible EMC Captiva PixTools Distributed Imaging ActiveX Control Vulnerable WriteToLog Method Arbitrary File Creation/Overwrite Attempt; [1,2,3
7,7012015/01/20 2010034  ET DELETED Internal User may have Visited an ASProx Infected Site (bannerdriven.ru); [1,2
7,7002015/01/20 2010033  ET DELETED Internal User may have Visited an ASProx Infected Site (bannert.ru); [1,2
7,6992015/01/20 2010032  ET DELETED Internal User may have Visited an ASProx Infected Site (ads-t.ru); [1,2
7,6982015/01/20 2010031  ET WEB_SPECIFIC_APPS Possible Novell eDirectory 'dconserv.dlm' Cross-Site Scripting Attempt; [1,2
7,6972015/01/20 2010030  ET POLICY Exchange 2003 OWA plain-text E-Mail message access not SSL; [1
7,6962015/01/20 2010029  ET ACTIVEX PDFZilla 1.0.8 ActiveX DebugMsgLog method DOS CLSid Access; [1,2
7,6952015/01/20 2010028  ET WEB_SPECIFIC_APPS NewSolved newsscript.php jahr Parameter SQL Injection; [1,2,3
7,6942015/01/20 2010027  ET WEB_SPECIFIC_APPS DM Albums album.php SECURITY_FILE Parameter Remote File Inclusion; [1,2,3
7,6932015/01/20 2010026  ET WEB_SPECIFIC_APPS TorrentTrader Classic delreq.php categ Parameter Sql Injection; [1,2
7,6922015/01/20 2010025  ET WEB_SPECIFIC_APPS DM Albums album.php SECURITY_FILE Parameter Local File Inclusion; [1,2,3
7,6912015/01/20 2010024  ET WEB_SPECIFIC_APPS LightOpenCMS smarty.php cwd Parameter Remote File Inclusion; [1,2,3
7,6902015/01/20 2010023  ET WEB_SPECIFIC_APPS LightOpenCMS smarty.php cwd Parameter Local File Inclusion; [1,2,3
7,6892015/01/20 2010022  ET WEB_SPECIFIC_APPS AdaptWeb a_index.php CodigoDisciplina Parameter Remote SQL Injection; [1,2,3
7,6882015/01/20 2010021  ET WEB_SPECIFIC_APPS RS-CMS rscms_mod_newsview.php key Parameter Processing Remote SQL Injection; [1,2,3
7,6872015/01/20 2010020  ET WEB_SPECIFIC_APPS SHOP-INET show_cat2.php grid Parameter SQL Injection; [1,2,3
7,6862015/01/20 2010019  ET SCAN Tomcat Web Application Manager scanning; [1
7,6852015/01/20 2010018  ET WEB_SPECIFIC_APPS Possible Joomla Game Server Component id Parameter INSERT INTO SQL Injection; [1,2
7,6842015/01/20 2010017  ET WEB_SPECIFIC_APPS Possible Joomla! Game Server Component 'id' Parameter UPDATE SET SQL Injection; [1,2
7,6832015/01/20 2010016  ET WEB_SPECIFIC_APPS Possible Joomla! Game Server Component 'id' Parameter DELETE FROM SQL Injection; [1,2
7,6822015/01/20 2010015  ET WEB_SPECIFIC_APPS Possible Joomla! Game Server Component 'id' Parameter SELECT FROM SQL Injection; [1,2
7,6812015/01/20 2010014  ET WEB_SPECIFIC_APPS Possible Joomla! Game Server Component 'id' Parameter UNION SELECT SQL Injection; [1,2
7,6802015/01/20 2010013  ET ACTIVEX Possible SAP GUI ActiveX Control Insecure Method File Overwrite Attempt; [1,2
7,6792015/01/20 2010012  ET ACTIVEX Possible EMC Captiva QuickScan Pro KeyWorks KeyHelp Module keyhelp.ocx ActiveX Control Remote Buffer Overflow Attempt; [1,2,3,4
7,6782015/01/20 2010011  ET ACTIVEX Possible Symantec Altiris Deployment Solution AeXNSPkgDLLib.dll ActiveX Control DownloadAndInstall Method Arbitrary Code Execution Attempt; [1,2,3,4
7,6772015/01/20 2010010  ET ACTIVEX Possible HP LoadRunner XUpload.ocx ActiveX Control MakeHttpRequest Arbitrary File Download Attempt; [1,2
7,6762015/01/20 2010009  ET WEB_SPECIFIC_APPS Webmin Pre-1.290 Compromise Attempt; [1,2
7,6752015/01/20 2010008  ET P2P Octoshape P2P streaming media; [1
7,6742015/01/20 2010007  ET TROJAN Potential Gemini Malware Download; [1,2
7,6732015/01/20 2010004  ET WEB_SERVER SQL sp_start_job attempt; [1
7,6722015/01/20 2010003  ET EXPLOIT xp_enumdsn access; [1
7,6712015/01/20 2010002  ET EXPLOIT xp_readerrorlogs access; [1
7,6702015/01/20 2010001  ET EXPLOIT xp_enumerrorlogs access; [1
7,6692015/01/20 2010000  ET EXPLOIT xp_fileexist access; [1
7,6682015/01/20 2009999  ET EXPLOIT xp_servicecontrol access; [1
7,6672015/01/20 2009998  ET POLICY Smilebox Spyware Download; [1,2
7,6662015/01/20 2009995  ET MALWARE User-Agent (ONANDON); [1
7,6652015/01/20 2009994  ET TROJAN User-Agent (STEROID Download); [1,2,3
7,6642015/01/20 2009993  ET MALWARE www.vaccinekiller.com Related Spyware User-Agent (VaccineKillerIU); [1
7,6632015/01/20 2009991  ET MALWARE User-Agent (MyIE/1.0); [1
7,6622015/01/20 2009990  ET WEB_SPECIFIC_APPS Possible IBM Lotus Connections simpleSearch.do Cross-Site Scripting Attempt; [1,2
< 381  382  383  384  385  386  387  388  389  390 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.