번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
9,461 | 2015/01/20 | 2012108 | ET WEB_CLIENT Hex Obfuscation of charCodeAt %u UTF-16 Encoding; [1,2] |
9,460 | 2015/01/20 | 2012107 | ET WEB_CLIENT Hex Obfuscation of document.write %u UTF-16 Encoding; [1,2] |
9,459 | 2015/01/20 | 2012106 | ET WEB_CLIENT Hex Obfuscation of arguments.callee %u UTF-16 Encoding; [1,2] |
9,458 | 2015/01/20 | 2012105 | ET MALWARE AdVantage Malware URL Infection Report; [1] |
9,457 | 2015/01/20 | 2012104 | ET MALWARE User-Agent (AdVantage); [1] |
9,456 | 2015/01/20 | 2012103 | ET EXPLOIT D-Link bsc_wlan.php Security Bypass; [1] |
9,455 | 2015/01/20 | 2012102 | ET ACTIVEX Image Viewer CP Gold Image2PDF Buffer Overflow; [1] |
9,454 | 2015/01/20 | 2012101 | ET EXPLOIT Oracle Virtual Server Agent Command Injection Attempt; [1] |
9,453 | 2015/01/20 | 2012100 | ET WEB_CLIENT Oracle Java 6 Object Tag launchjnlp docbase Parameters Buffer Overflow; [1] |
9,452 | 2015/01/20 | 2012099 | ET WEB_SPECIFIC_APPS Joomla Component Billy Portfolio catid Parameter Blind SQL Injection Attempt; [1] |
9,451 | 2015/01/20 | 2012098 | ET ACTIVEX J-Integra ActiveX SetIdentity Buffer Overflow; [1] |
9,450 | 2015/01/20 | 2012097 | ET ACTIVEX WMITools ActiveX Remote Code Execution; [1] |
9,449 | 2015/01/20 | 2012096 | ET SCADA DATAC RealWin SCADA Server Buffer Overflow; [1,2] |
9,448 | 2015/01/20 | 2012095 | ET ACTIVEX J-Integra Remote Code Execution; [1] |
9,447 | 2015/01/20 | 2012094 | ET NETBIOS SMB Trans2 Query_Fs_Attribute_Info SrvSmbQueryFsInformation Pool Buffer Overflow; [1,2,3] |
9,446 | 2015/01/20 | 2012093 | ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1] |
9,445 | 2015/01/20 | 2012092 | ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1] |
9,444 | 2015/01/20 | 2012091 | ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1] |
9,443 | 2015/01/20 | 2012090 | ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1] |
9,442 | 2015/01/20 | 2012089 | ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1] |
9,441 | 2015/01/20 | 2012088 | ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1] |
9,440 | 2015/01/20 | 2012087 | ET SHELLCODE Possible Call with No Offset UDP Shellcode; [1] |
9,439 | 2015/01/20 | 2012086 | ET SHELLCODE Possible Call with No Offset TCP Shellcode; [1] |
9,438 | 2015/01/20 | 2012085 | ET WEB_CLIENT Oracle Java 6 Object Tag launchjnlp docbase Parameters Flowbits Set; |
9,437 | 2015/01/20 | 2012084 | ET NETBIOS Microsoft Windows SMB Client Race Condition Remote Code Execution; [1,2] |
9,436 | 2015/01/20 | 2012083 | ET DELETED Possible Bozvanovna Zeus Campaign SSL Certificate; [1] |
9,435 | 2015/01/20 | 2012082 | ET DELETED Possible Bozvanovna Zeus Campaign Binary File URL; [1] |
9,434 | 2015/01/20 | 2012081 | ET DELETED Possible Bozvanovna Zeus Campaign Config File URL; [1] |
9,433 | 2015/01/20 | 2012080 | ET POLICY Windows-Based OpenSSL Tunnel Connection Outbound 3; [1] |
9,432 | 2015/01/20 | 2012079 | ET POLICY Windows-Based OpenSSL Tunnel Connection Outbound 2; [1] |
9,431 | 2015/01/20 | 2012078 | ET POLICY Windows-Based OpenSSL Tunnel Outbound; [1] |
9,430 | 2015/01/20 | 2012077 | ET SCAN Goatzapszu Header from unknown Scanning Tool; |
9,429 | 2015/01/20 | 2012076 | ET TROJAN Win32.Krap.ar Infection URL Request; [1] |
9,428 | 2015/01/20 | 2012075 | ET WEB_CLIENT Possible Internet Explorer CSS Parser Remote Code Execution Attempt; [1,2,3,4,5] |
9,427 | 2015/01/20 | 2012074 | ET WEB_SPECIFIC_APPS Aigaion ID Parameter DELETE FROM SQL Injection Attempt; [1,2] |
9,426 | 2015/01/20 | 2012073 | ET WEB_SPECIFIC_APPS Aigaion ID Parameter SELECT FROM SQL Injection Attempt; [1,2] |
9,425 | 2015/01/20 | 2012072 | ET WEB_SPECIFIC_APPS WordPress Safe Search Plugin v1 Parameter Cross Site Scripting Attempt; [1] |
9,424 | 2015/01/20 | 2012071 | ET WEB_SPECIFIC_APPS Google Urchin session.cgi Local File Inclusion Attempt; [1] |
9,423 | 2015/01/20 | 2012070 | ET WEB_SPECIFIC_APPS MantisBT db_type Parameter Cross Site Scripting Attempt; [1,2] |
9,422 | 2015/01/20 | 2012069 | ET WEB_SPECIFIC_APPS MantisBT db_type Parameter Local File Inclusion Attempt; [1,2] |
9,421 | 2015/01/20 | 2012068 | ET WEB_SPECIFIC_APPS Profi Einzelgebots Auktions System auktion_text.php Blind SQL Injection Attempt; [1] |
9,420 | 2015/01/20 | 2012066 | ET WEB_SPECIFIC_APPS Aigaion ID Parameter INSERT INTO SQL Injection Attempt; [1,2] |
9,419 | 2015/01/20 | 2012065 | ET WEB_SPECIFIC_APPS Aigaion ID Parameter UNION SELECT SQL Injection Attempt; [1,2] |
9,418 | 2015/01/20 | 2012064 | ET WEB_CLIENT Foxit PDF Reader Title Stack Overflow; [1] |
9,417 | 2015/01/20 | 2012063 | ET NETBIOS Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference; [1,2] |
9,416 | 2015/01/20 | 2012062 | ET WEB_CLIENT Hex Obfuscation of arguments.callee %u UTF-8 Encoding; [1,2] |
9,415 | 2015/01/20 | 2012061 | ET WEB_CLIENT Hex Obfuscation of arguments.callee % Encoding; [1,2] |
9,414 | 2015/01/20 | 2012060 | ET WEB_CLIENT Hex Obfuscation of document.write %u UTF-8 Encoding; [1,2] |
9,413 | 2015/01/20 | 2012059 | ET WEB_CLIENT Hex Obfuscation of document.write % Encoding; [1,2] |
9,412 | 2015/01/20 | 2012058 | ET EXPLOIT HP LaserJet PLJ Interface Directory Traversal; [1] |
< 351 352 353 354 355 356 357 358 359 360 > |