번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
13,161 | 2015/01/20 | 2016014 | ET TROJAN Win32/Trojan.Agent.AXMO CnC Beacon; [1] |
13,160 | 2015/01/20 | 2016013 | ET CURRENT_EVENTS CritXPack Jar Request (2); |
13,159 | 2015/01/20 | 2016012 | ET CURRENT_EVENTS CritXPack PDF Request (2); |
13,158 | 2015/01/20 | 2016011 | ET TROJAN SmokeBot grab data plaintext; |
13,157 | 2015/01/20 | 2016010 | ET WEB_SPECIFIC_APPS Inventory newtransact.php Cross Site Scripting Attempt; [1] |
13,156 | 2015/01/20 | 2016009 | ET WEB_SPECIFIC_APPS Inventory newinventario.php Cross Site Scripting Attempt; [1] |
13,155 | 2015/01/20 | 2016008 | ET WEB_SPECIFIC_APPS Inventory consulta_fact.php Cross Site Scripting Attempt; [1] |
13,154 | 2015/01/20 | 2016007 | ET WEB_SPECIFIC_APPS PRADO PHP Framework functional.php Local File Inclusion Vulnerability; [1] |
13,153 | 2015/01/20 | 2016006 | ET WEB_SPECIFIC_APPS PRADO PHP Framework functional_tests.php Local File Inclusion Vulnerability; [1] |
13,152 | 2015/01/20 | 2016005 | ET WEB_SPECIFIC_APPS Achievo atknodetype parameter Local File Inclusion Vulnerability; [1] |
13,151 | 2015/01/20 | 2016004 | ET WEB_SPECIFIC_APPS ViArt Shop Evaluation previews_functions.php Remote File Inclusion Attempt; [1] |
13,150 | 2015/01/20 | 2016003 | ET WEB_SPECIFIC_APPS ViArt Shop Evaluation ajax_list_tree.php Remote File Inclusion Attempt; [1] |
13,149 | 2015/01/20 | 2016002 | ET WEB_SPECIFIC_APPS ViArt Shop Evaluation admin_header.php Remote File Inclusion Attempt; [1] |
13,148 | 2015/01/20 | 2016001 | ET CURRENT_EVENTS PDF /XFA and PDF-1.[0-4] Spec Violation (seen in pamdql and other EKs); |
13,147 | 2015/01/20 | 2016000 | ET TROJAN Win32/Necurs; [1] |
13,146 | 2015/01/20 | 2015999 | ET TROJAN W32/Quarian HTTP Proxy Header; [1] |
13,145 | 2015/01/20 | 2015998 | ET CURRENT_EVENTS CritXPack Landing Pattern; |
13,144 | 2015/01/20 | 2015997 | ET CURRENT_EVENTS Fake Google Chrome Update/Install; [1,2] |
13,143 | 2015/01/20 | 2015996 | ET EXPLOIT MySQL Server for Windows Remote SYSTEM Level Exploit (Stuxnet Technique); [1] |
13,142 | 2015/01/20 | 2015995 | ET EXPLOIT MySQL Server for Windows Remote SYSTEM Level Exploit (Stuxnet Techique DUMP INTO executable); [1] |
13,141 | 2015/01/20 | 2015994 | ET INFO MySQL Database Query Version OS compile; |
13,140 | 2015/01/20 | 2015993 | ET ATTACK_RESPONSE MySQL User Account Enumeration; [1] |
13,139 | 2015/01/20 | 2015992 | ET EXPLOIT MySQL (Linux) Database Privilege Elevation (Exploit Specific); [1] |
13,138 | 2015/01/20 | 2015991 | ET CURRENT_EVENTS Robopak - Landing Page Received; |
13,137 | 2015/01/20 | 2015990 | ET CURRENT_EVENTS RedKit - Potential Payload Requested - /2Digit.html; |
13,136 | 2015/01/20 | 2015989 | ET CURRENT_EVENTS RedKit - Potential Java Exploit Requested - 3 digit jar; |
13,135 | 2015/01/20 | 2015988 | ET CURRENT_EVENTS CrimeBoss - Stats Load Fail; |
13,134 | 2015/01/20 | 2015987 | ET EXPLOIT MySQL Heap based buffer overrun Exploit Specific; [1] |
13,133 | 2015/01/20 | 2015986 | ET SCAN MYSQL MySQL Remote FAST Account Password Cracking; [1] |
13,132 | 2015/01/20 | 2015985 | ET TROJAN Win32/Kuluoz.B Request; |
13,131 | 2015/01/20 | 2015984 | ET WEB_SERVER Joomla Component SQLi Attempt; |
13,130 | 2015/01/20 | 2015983 | ET CURRENT_EVENTS PHISH Bank - York - Creds Phished; |
13,129 | 2015/01/20 | 2015982 | ET CURRENT_EVENTS Zuponcic Hostile JavaScript; |
13,128 | 2015/01/20 | 2015981 | ET CURRENT_EVENTS Zuponcic Hostile Jar; |
13,127 | 2015/01/20 | 2015980 | ET CURRENT_EVENTS PHISH Google - Account Phished; |
13,126 | 2015/01/20 | 2015979 | ET CURRENT_EVENTS CritXPack - Landing Page; |
13,125 | 2015/01/20 | 2015978 | ET CURRENT_EVENTS Blackhole Java applet with obfuscated URL Dec 03 2012; |
13,124 | 2015/01/20 | 2015977 | ET CURRENT_EVENTS probable malicious Glazunov Javascript injection; |
13,123 | 2015/01/20 | 2015976 | ET TROJAN WORM_VOBFUS Checkin Generic; [1,2] |
13,122 | 2015/01/20 | 2015975 | ET EXPLOIT MySQL Stack based buffer overrun Exploit Specific; [1] |
13,121 | 2015/01/20 | 2015974 | ET CURRENT_EVENTS Sibhost Status Check; |
13,120 | 2015/01/20 | 2015973 | ET CURRENT_EVENTS PHISH Gateway POST to gateway-p; |
13,119 | 2015/01/20 | 2015972 | ET CURRENT_EVENTS PHISH PayPal - Account Phished; |
13,118 | 2015/01/20 | 2015971 | ET CURRENT_EVENTS Zuponcic EK Java Exploit Jar; |
13,117 | 2015/01/20 | 2015970 | ET CURRENT_EVENTS Zuponcic EK Payload Request; |
13,116 | 2015/01/20 | 2015969 | ET TROJAN WORM_VOBFUS Requesting exe; [1] |
13,115 | 2015/01/20 | 2015968 | ET TROJAN WORM_VOBFUS Checkin 1; [1] |
13,114 | 2015/01/20 | 2015967 | ET P2P QVOD P2P Sharing Traffic detected (udp) payload; |
13,113 | 2015/01/20 | 2015966 | ET P2P QVOD P2P Sharing Traffic detected (udp) beacon; |
13,112 | 2015/01/20 | 2015965 | ET INFO EXE SCardForgetReaderGroupA (Used in Malware Anti-Debugging); [1] |
< 271 272 273 274 275 276 277 278 279 280 > |