시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,6612015/01/20 2009988  ET TROJAN Banker.Delf User-Agent (MzApp); [1,2
7,6602015/01/20 2009987  ET DELETED OneStep Adware related User Agent (x); [1
7,6592015/01/20 2009986  ET P2P Octoshape UDP Session; [1,2
7,6582015/01/20 2009985  ET FTP Possible FTP Daemon Username UNION SELECT SQL Injection Attempt; [1,2
7,6572015/01/20 2009984  ET FTP Possible FTP Daemon Username UPDATE SET SQL Injection Attempt; [1,2
7,6562015/01/20 2009983  ET FTP Possible FTP Daemon Username INSERT INTO SQL Injection Attempt; [1,2
7,6552015/01/20 2009982  ET FTP Possible FTP Daemon Username DELETE FROM SQL Injection Attempt; [1,2
7,6542015/01/20 2009981  ET FTP Possible FTP Daemon Username SELECT FROM SQL Injection Attempt; [1,2
7,6532015/01/20 2009980  ET WEB_SPECIFIC_APPS CMScontrol 7.x (index.php id_menu) SQL Injection Vulnerability; [1,2
7,6522015/01/20 2009979  ET WEB_SPECIFIC_APPS CMScontrol 7.x (index.php id_menu) SQL Injection Vulnerability; [1,2
7,6512015/01/20 2009978  ET WEB_SPECIFIC_APPS CMScontrol 7.x (index.php id_menu) SQL Injection Vulnerability; [1,2
7,6502015/01/20 2009977  ET WEB_SPECIFIC_APPS CMScontrol 7.x (index.php id_menu) SQL Injection Vulnerability; [1,2
7,6492015/01/20 2009976  ET EXPLOIT Siemens Gigaset SE361 WLAN Data Flood Denial of Service Vulnerability; [1,2
7,6482015/01/20 2009973  ET P2P eMule KAD Network Send Username; [1,2
7,6472015/01/20 2009972  ET P2P eMule KAD Network Server Status Request; [1,2
7,6462015/01/20 2009971  ET DELETED eMule KAD Network Hello Request (2); [1,2
7,6452015/01/20 2009970  ET P2P eMule Kademlia Hello Request; [1,2
7,6442015/01/20 2009969  ET P2P eMule KAD Network Firewalled Request; [1,2
7,6432015/01/20 2009968  ET P2P eMule KAD Network Connection Request(2); [1,2
7,6422015/01/20 2009967  ET P2P eMule KAD Network Connection Request; [1,2
7,6412015/01/20 2009966  ET P2P KuGoo P2P Connection; [1,2
7,6402015/01/20 2009965  ET WEB_SPECIFIC_APPS Joomla! SportFusion Component UPDATE SET SQL Injection; [1,2
7,6392015/01/20 2009964  ET WEB_SPECIFIC_APPS Joomla! SportFusion Component INSERT INTO SQL Injection; [1,2
7,6382015/01/20 2009963  ET WEB_SPECIFIC_APPS Joomla! SportFusion Component UNION SELECT SQL Injection; [1,2
7,6372015/01/20 2009962  ET WEB_SPECIFIC_APPS Joomla! SportFusion Component DELETE FROM SQL Injection; [1,2
7,6362015/01/20 2009961  ET WEB_SPECIFIC_APPS Joomla! SportFusion Component SELECT FROM SQL Injection; [1,2
7,6352015/01/20 2009960  ET WEB_SPECIFIC_APPS Joomla! JoomlaFacebook Component UPDATE SET SQL Injection; [1,2
7,6342015/01/20 2009959  ET WEB_SPECIFIC_APPS Joomla! JoomlaFacebook Component INSERT INTO SQL Injection; [1,2
7,6332015/01/20 2009958  ET WEB_SPECIFIC_APPS Joomla! JoomlaFacebook Component UNION SELECT SQL Injection; [1,2
7,6322015/01/20 2009957  ET WEB_SPECIFIC_APPS Joomla! JoomlaFacebook Component DELETE FROM SQL Injection; [1,2
7,6312015/01/20 2009956  ET WEB_SPECIFIC_APPS Joomla! JoomlaFacebook Component SELECT FROM SQL Injection; [1,2
7,6302015/01/20 2009955  ET WEB_SERVER Tilde in URI, potential .php source disclosure vulnerability; [1,2
7,6292015/01/20 2009954  ET DELETED Tilde in URI after file, potential source disclosure vulnerability; [1,2
7,6282015/01/20 2009953  ET WEB_SERVER Tilde in URI, potential .aspx source disclosure vulnerability; [1,2
7,6272015/01/20 2009952  ET WEB_SERVER Tilde in URI, potential .asp source disclosure vulnerability; [1,2
7,6262015/01/20 2009951  ET WEB_SERVER Tilde in URI, potential .conf source disclosure vulnerability; [1,2
7,6252015/01/20 2009950  ET WEB_SERVER Tilde in URI, potential .inc source disclosure vulnerability; [1,2
7,6242015/01/20 2009949  ET WEB_SERVER Tilde in URI, potential .pl source disclosure vulnerability; [1,2
7,6232015/01/20 2009948  ET ACTIVEX Quiksoft EasyMail imap connect() ActiveX stack overflow vulnerability; [1,2,3
7,6222015/01/20 2009947  ET WEB_SPECIFIC_APPS Joomla! JBudgetsMagic 'bid' Parameter UPDATE SET SQL Injection; [1,2
7,6212015/01/20 2009946  ET WEB_SPECIFIC_APPS Joomla! JBudgetsMagic 'bid' Parameter INSERT INTO SQL Injection; [1,2
7,6202015/01/20 2009945  ET WEB_SPECIFIC_APPS Joomla! JBudgetsMagic 'bid' Parameter UNION SELECT SQL Injection; [1,2
7,6192015/01/20 2009944  ET WEB_SPECIFIC_APPS Joomla! JBudgetsMagic 'bid' Parameter DELETE FROM SQL Injection; [1,2
7,6182015/01/20 2009943  ET WEB_SPECIFIC_APPS Joomla! JBudgetsMagic 'bid' Parameter SELECT FROM SQL Injection; [1,2
7,6172015/01/20 2009942  ET WEB_SPECIFIC_APPS Joomla! Survey Manager Component UPDATE SET SQL Injection; [1,2
7,6162015/01/20 2009941  ET WEB_SPECIFIC_APPS Joomla! Survey Manager Component INSERT INTO SQL Injection; [1,2
7,6152015/01/20 2009940  ET WEB_SPECIFIC_APPS Joomla! Survey Manager Component UNION SELECT SQL Injection; [1,2
7,6142015/01/20 2009939  ET WEB_SPECIFIC_APPS Joomla! Survey Manager Component DELETE FROM SQL Injection; [1,2
7,6132015/01/20 2009938  ET WEB_SPECIFIC_APPS Joomla! Survey Manager Component SELECT FROM SQL Injection; [1,2
7,6122015/01/20 2009937  ET WEB_SPECIFIC_APPS Possible Mambo MOStlyCE Module Image Manager Utility Arbitrary File Upload Attempt; [1,2
< 381  382  383  384  385  386  387  388  389  390 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.