시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,6112015/01/20 2009936  ET WEB_SPECIFIC_APPS Plogger plog-download.php checked Parameter SQL Injection; [1,2,3
7,6102015/01/20 2009935  ET WEB_SPECIFIC_APPS Frontis aps_browse_sources.php source_class Parameter SQL Injection; [1,2,3
7,6092015/01/20 2009934  ET WEB_SPECIFIC_APPS Ideal MooFAQ Joomla Component file_includer.php file Parameter Local File Inclusion; [1,2
7,6082015/01/20 2009933  ET WEB_SPECIFIC_APPS Possible Mambo/Joomla! com_koesubmit Component 'koesubmit.php' Remote File Inclusion Attempt; [1,2,3
7,6072015/01/20 2009932  ET WEB_SPECIFIC_APPS Possible eFront database.php Remote File Inclusion Attempt; [1,2,3
7,6062015/01/20 2009931  ET WEB_SPECIFIC_APPS Possible OpenSiteAdmin pageHeader.php Remote File Inclusion Attempt; [1,2,3
7,6052015/01/20 2009930  ET MALWARE User-Agent (User Agent) - Likely Hostile; [1
7,6042015/01/20 2009929  ET WEB_SPECIFIC_APPS Possible Joomla! com_album Component Local File Inclusion Attempt; [1,2,3
7,6032015/01/20 2009928  ET WEB_SPECIFIC_APPS x10 Automatic MP3 Script layout_lyrics.php web_root Parameter Local file Inclusion; [1,2,3
7,6022015/01/20 2009927  ET WEB_SPECIFIC_APPS x10 Automatic MP3 Script layout_lyrics.php web_root Parameter Remote File Inclusion; [1,2,3
7,6012015/01/20 2009926  ET WEB_SPECIFIC_APPS x10 Automatic MP3 Script function_core.php web_root Parameter Local File Inclusion; [1,2,3
7,6002015/01/20 2009925  ET WEB_SPECIFIC_APPS x10 Automatic MP3 Script function_core.php web_root Parameter Remote File Inclusion; [1,2,3
7,5992015/01/20 2009924  ET WEB_SPECIFIC_APPS Joomla! Foobla RSS Feed Creator Component 'id' Parameter INSERT INTO SQL Injection; [1,2
7,5982015/01/20 2009923  ET ACTIVEX Possible Novell GroupWise Client 'gxmim1.dll' ActiveX Buffer Overflow Attempt; [1,2
7,5972015/01/20 2009922  ET WEB_SPECIFIC_APPS Joomla! Foobla RSS Feed Creator Component 'id' Parameter UPDATE SET SQL Injection; [1,2
7,5962015/01/20 2009921  ET WEB_SPECIFIC_APPS Joomla! Foobla RSS Feed Creator Component 'id' Parameter UNION SELECT SQL Injection; [1,2
7,5952015/01/20 2009920  ET WEB_SPECIFIC_APPS Joomla! Foobla RSS Feed Creator Component 'id' Parameter DELETE FROM SQL Injection; [1,2
7,5942015/01/20 2009919  ET WEB_SPECIFIC_APPS Joomla! Foobla RSS Feed Creator Component 'id' Parameter SELECT FROM SQL Injection; [1,2
7,5932015/01/20 2009917  ET WEB_SPECIFIC_APPS joomla com_djcatalog component UPDATE SET SQL Injection; [1,2
7,5922015/01/20 2009916  ET WEB_SPECIFIC_APPS joomla com_djcatalog component UNION SELECT SQL Injection; [1,2
7,5912015/01/20 2009915  ET WEB_SPECIFIC_APPS joomla com_djcatalog component INSERT INTO SQL Injection; [1,2
7,5902015/01/20 2009914  ET WEB_SPECIFIC_APPS joomla com_djcatalog component DELETE FROM SQL Injection; [1,2
7,5892015/01/20 2009913  ET WEB_SPECIFIC_APPS joomla com_djcatalog component SELECT FROM SQL Injection; [1,2
7,5882015/01/20 2009909  ET TROJAN Possible Windows executable sent when remote host claims to send HTML/CSS Content; [1
7,5872015/01/20 2009908  ET DELETED PinBall Corp. Related suspicious activity; [1
7,5862015/01/20 2009907  ET ACTIVEX Remote Desktop Connection ActiveX Control Heap Overflow clsid access; [1,2
7,5852015/01/20 2009906  ET WEB_SPECIFIC_APPS Online Grades parents.php ADD Parameter SQL Injection; [1,2,3
7,5842015/01/20 2009905  ET WEB_SPECIFIC_APPS Unclassified NewsBoard forum.php __tplCollection Parameter Local File Inclusion; [1,2,3
7,5832015/01/20 2009904  ET WEB_SPECIFIC_APPS AdaptBB latestposts.php forumspath Parameter Local File Inclusion; [1,2,3
7,5822015/01/20 2009903  ET WEB_SPECIFIC_APPS AdaptBB latestposts.php forumspath Parameter Remote File Inclusion; [1,2,3
7,5812015/01/20 2009898  ET WEB_SPECIFIC_APPS Pragyan CMS form.lib.php sourceFolder Parameter Remote File Inclusion; [1,2,3
7,5802015/01/20 2009897  ET MALWARE Possible Windows executable sent when remote host claims to send html content; [1
7,5792015/01/20 2009896  ET TROJAN Win32/Winwebsec User-Agent Detected; [1,2,3
7,5782015/01/20 2009895  ET POLICY OperaUnite URL Registration; [1,2
7,5772015/01/20 2009894  ET ACTIVEX Possible HTTP ACTi SaveXMLFile()/DeleteXMLFile() nvUnifiedControl.dll Arbitrary File Overwrite/Deletion Attempt; [1,2,3,4
7,5762015/01/20 2009893  ET ACTIVEX Possible HTTP ACTi SetText() nvUnifiedControl.dll Buffer Overflow Attempt; [1,2,3,4
7,5752015/01/20 2009892  ET WEB_SPECIFIC_APPS PHP-Paid4Mail RFI attempt; [1,2
7,5742015/01/20 2009891  ET WEB_SPECIFIC_APPS MAXcms RFI attempt (4); [1,2,3
7,5732015/01/20 2009890  ET WEB_SPECIFIC_APPS MAXcms RFI attempt (3); [1,2,3
7,5722015/01/20 2009889  ET WEB_SPECIFIC_APPS MAXcms RFI attempt (2); [1,2,3
7,5712015/01/20 2009888  ET WEB_SPECIFIC_APPS MAXcms RFI attempt (1); [1,2,3
7,5702015/01/20 2009887  ET WEB_SPECIFIC_APPS ProjectButler RFI attempt; [1,2,3
7,5692015/01/20 2009886  ET NETBIOS Remote SMB2.0 DoS Exploit; [1,2
7,5682015/01/20 2009885  ET SCAN Unusually Fast 404 Error Messages (Page Not Found), Possible Web Application Scan/Directory Guessing Attack; [1,2,3
7,5672015/01/20 2009884  ET SCAN Unusually Fast 400 Error Messages (Bad Request), Possible Web Application Scan; [1,2,3
7,5662015/01/20 2009883  ET SCAN Possible Mysqloit Operating System Fingerprint/SQL Injection Test Scan Detected; [1,2
7,5652015/01/20 2009882  ET SCAN Default Mysqloit User Agent Detected - Mysql Injection Takover Tool; [1
7,5642015/01/20 2009881  ET WEB_SPECIFIC_APPS Possible Joomla Com_joomlub Component Union Select SQL Injection; [1,2
7,5632015/01/20 2009880  ET MALWARE Casalemedia Spyware Reporting URL Visited 3; [1
7,5622015/01/20 2009878  ET WEB_SPECIFIC_APPS Harlandscripts Pro Traffic One mypage.php trg Parameter SQL Injection; [1,2,3
< 391  392  393  394  395  396  397  398  399  400 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.