번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 7,811 | 2015/01/20 | 2010172 | ET WEB_SPECIFIC_APPS WebSense Email security msgAnalyse.asp IsolatedMessageID XSS Attempt; [1,2] | 7,810 | 2015/01/20 | 2010171 | ET WEB_SPECIFIC_APPS WebSense Email security msgAnalyse.asp FileName XSS Attempt; [1,2] | 7,809 | 2015/01/20 | 2010170 | ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp ServerName XSS Attempt; [1,2] | 7,808 | 2015/01/20 | 2010169 | ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp IsolatedMessageID XSS Attempt; [1,2] | 7,807 | 2015/01/20 | 2010168 | ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp FileName XSS Attempt; [1,2] | 7,806 | 2015/01/20 | 2010167 | ET WEB_SPECIFIC_APPS WebSense Email security viewHeaders.asp Queue XSS Attempt; [1,2] | 7,805 | 2015/01/20 | 2010165 | ET TROJAN Tibs/Harnig Downloader Activity; [1,2,3] | 7,804 | 2015/01/20 | 2010164 | ET TROJAN Daonol C&C Communication; [1,2,3,4,5] | 7,803 | 2015/01/20 | 2010163 | ET TROJAN Glacial Dracon C&C Communication; [1,2,3] | 7,802 | 2015/01/20 | 2010162 | ET WEB_SERVER Possible Successful Juniper NetScreen ScreenOS Firmware Version Disclosure Attempt; [1,2,3,4,5] | 7,801 | 2015/01/20 | 2010161 | ET ACTIVEX Possible Edraw PDF Viewer FtpConnect Component ActiveX Remote code execution Attempt; [1,2] | 7,800 | 2015/01/20 | 2010160 | ET ACTIVEX Possible AOL IWinAmp ActiveX ConvertFile Buffer Overflow Attempt; [1,2,3] | 7,799 | 2015/01/20 | 2010159 | ET WEB_SERVER Possible 3Com OfficeConnect Router Default User Account Remote Command Execution Attempt; [1,2,3,4] | 7,798 | 2015/01/20 | 2010158 | ET TROJAN Nanspy Bot Checkin; [1] | 7,797 | 2015/01/20 | 2010157 | ET POLICY Suspicious User-Agent (XXX) Often Sony Update Related; [1] | 7,796 | 2015/01/20 | 2010156 | ET GAMES Alien Arena 7.30 Remote Code Execution Attempt; [1,2] | 7,795 | 2015/01/20 | 2010155 | ET ACTIVEX EMC Captiva PixTools ActiveX Arbitrary File Creation/Overwrite function call Attempt; [1,2,3] | 7,794 | 2015/01/20 | 2010154 | ET ACTIVEX EMC Captiva PixTools ActiveX Arbitrary File Creation/Overwrite function call Attempt; [1,2,3] | 7,793 | 2015/01/20 | 2010153 | ET TROJAN Koobface fetch C&C command detected; [1,2] | 7,792 | 2015/01/20 | 2010152 | ET TROJAN Koobface C&C availability check successful; [1,2] | 7,791 | 2015/01/20 | 2010151 | ET TROJAN Koobface C&C availability check; [1,2] | 7,790 | 2015/01/20 | 2010150 | ET TROJAN Koobface HTTP Request (2); [1,2] | 7,789 | 2015/01/20 | 2010148 | ET TROJAN DHL Spam Inbound; [1] | 7,788 | 2015/01/20 | 2010147 | ET WEB_SPECIFIC_APPS Possible bloofoxCMS 'search' Parameter Cross Site Scripting Attempt; [1,2] | 7,787 | 2015/01/20 | 2010146 | ET WEB_SPECIFIC_APPS Possible Apache Tomcat Host Manager Cross Site Scripting Attempt; [1,2] | 7,786 | 2015/01/20 | 2010145 | ET WEB_SPECIFIC_APPS Possible IBM Rational RequisitePro ReqWebHelp Cross Site Scripting Attempt; [1,2,3] | 7,785 | 2015/01/20 | 2010144 | ET P2P Vuze BT UDP Connection (5); [1,2] | 7,784 | 2015/01/20 | 2010143 | ET P2P Vuze BT UDP Connection (4); [1] | 7,783 | 2015/01/20 | 2010142 | ET P2P Vuze BT UDP Connection (3); [1] | 7,782 | 2015/01/20 | 2010141 | ET P2P Vuze BT UDP Connection (2); [1,2] | 7,781 | 2015/01/20 | 2010140 | ET P2P Vuze BT UDP Connection; [1,2] | 7,780 | 2015/01/20 | 2010139 | ET P2P Vuze BT Connection; [1,2] | 7,779 | 2015/01/20 | 2010138 | ET TROJAN Possible Win32/Agent.QBY CnC Post; [1,2] | 7,778 | 2015/01/20 | 2010137 | ET MALWARE Suspicious User-Agent (Sme32); [1] | 7,777 | 2015/01/20 | 2010136 | ET DELETED Suspicious User-Agent (asp2009); [1,2] | 7,776 | 2015/01/20 | 2010135 | ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable UPDATE SET SQL Injection Attempt; [1,2,3,4] | 7,775 | 2015/01/20 | 2010134 | ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable DELETE FROM SQL Injection Attempt; [1,2,3,4] | 7,774 | 2015/01/20 | 2010133 | ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable INSERT INTO SQL Injection Attempt; [1,2,3,4] | 7,773 | 2015/01/20 | 2010132 | ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable SELECT FROM SQL Injection Attempt; [1,2,3,4] | 7,772 | 2015/01/20 | 2010131 | ET WEB_SPECIFIC_APPS Possible Achievo userid= Variable UNION SELECT SQL Injection Attempt; [1,2,3,4] | 7,771 | 2015/01/20 | 2010129 | ET TROJAN TROJAN Drop.Agent.bfsv HTTP Activity (UsER-AgENt); [1] | 7,770 | 2015/01/20 | 2010127 | ET WEB_SPECIFIC_APPS Ultrize TimeSheet timesheet.php include_dir Parameter Local File Inclusion; [1,2,3] | 7,769 | 2015/01/20 | 2010126 | ET WEB_SPECIFIC_APPS Ultrize TimeSheet timesheet.php include_dir Parameter Remote File Inclusion; [1,2,3] | 7,768 | 2015/01/20 | 2010125 | ET WEB_SPECIFIC_APPS SERWeb main_prepend.php functionsdir Parameter Remote File Inclusion; [1,2] | 7,767 | 2015/01/20 | 2010124 | ET WEB_SPECIFIC_APPS SERWeb load_lang.php configdir Parameter Remote File Inclusion; [1,2] | 7,766 | 2015/01/20 | 2010123 | ET WEB_SPECIFIC_APPS NewSolved newsscript.php newsid Parameter SQL Injection; [1,2,3] | 7,765 | 2015/01/20 | 2010122 | ET WEB_SPECIFIC_APPS NewSolved newsscript.php idneu Parameter SQL Injection; [1,2,3] | 7,764 | 2015/01/20 | 2010121 | ET WEB_SPECIFIC_APPS Celepar module for Xoops aviso.php codigo SQL injection; [1,2,3] | 7,763 | 2015/01/20 | 2010119 | ET WEB_SERVER xp_cmdshell Attempt in Cookie; [1,2,3,4] | 7,762 | 2015/01/20 | 2010101 | ET TROJAN Palevo/BFBot/Mariposa server join acknowledgement; [1,2,3,4,5,6] | < 381 382 383 384 385 386 387 388 389 390 > |
|