번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 8,011 | 2015/01/20 | 2010386 | ET SHELLCODE METASPLOIT BSD Bind shell (Countdown Encoded 3); [1] | 8,010 | 2015/01/20 | 2010385 | ET SHELLCODE METASPLOIT BSD Bind shell (Countdown Encoded 2); [1] | 8,009 | 2015/01/20 | 2010383 | ET SHELLCODE METASPLOIT BSD Bind shell; [1] | 8,008 | 2015/01/20 | 2010382 | ET TROJAN Fake AV GET; [1,2] | 8,007 | 2015/01/20 | 2010381 | ET TROJAN Syrutrk/Gibon/Bredolab Checkin; [1,2,3,4] | 8,006 | 2015/01/20 | 2010380 | ET WEB_SERVER JBOSS/JMX REMOTE WAR deployment attempt (GET); [1,2,3] | 8,005 | 2015/01/20 | 2010379 | ET WEB_SERVER JBOSS/JMX REMOTE WAR deployment attempt (POST); [1,2,3] | 8,004 | 2015/01/20 | 2010378 | ET POLICY JBOSS/JMX port 8080 access from outside; [1,2,3] | 8,003 | 2015/01/20 | 2010377 | ET POLICY JBOSS/JMX port 80 access from outside; [1,2,3] | 8,002 | 2015/01/20 | 2010376 | ET DELETED WU Malicious Spam Inbound; [1] | 8,001 | 2015/01/20 | 2010375 | ET EXPLOIT Possible Oracle Database Text Component ctxsys.drvxtabc.create_tables Remote SQL Injection Attempt; [1,2] | 8,000 | 2015/01/20 | 2010374 | ET ACTIVEX Haihaisoft Universal Player ActiveX Control URL Property Buffer Overflow Function Call Attempt; [1,2,3] | 7,999 | 2015/01/20 | 2010373 | ET ACTIVEX Haihaisoft Universal Player ActiveX Control URL Property Buffer Overflow Attempt; [1,2,3] | 7,998 | 2015/01/20 | 2010372 | ET SCAN Amap UDP Service Scan Detected; [1,2] | 7,997 | 2015/01/20 | 2010371 | ET SCAN Amap TCP Service Scan Detected; [1,2] | 7,996 | 2015/01/20 | 2010370 | ET ACTIVEX ACTIVEX Possible Symantec Altiris Deployment Solution and Notification Server ActiveX Control RunCmd Arbitrary Code Execution Function Call Attempt; [1,2,3] | 7,995 | 2015/01/20 | 2010369 | ET ACTIVEX Possible Symantec Altiris Deployment Solution and Notification Server ActiveX Control RunCmd Arbitrary Code Execution Attempt; [1,2,3] | 7,994 | 2015/01/20 | 2010368 | ET ACTIVEX Gom Player V 2.1.16 ActiveX Command Execution Function call attempt; [1,2] | 7,993 | 2015/01/20 | 2010367 | ET ACTIVEX Gom Player V 2.1.16 Activex Command Execution clsid access attempt; [1,2] | 7,992 | 2015/01/20 | 2010366 | ET ACTIVEX ProgramChecker 1.5 ActiveX Command Execution Function call attempt; [1,2] | 7,991 | 2015/01/20 | 2010365 | ET ACTIVEX ProgramChecker 1.5 Activex Command Execution clsid access attempt; [1,2] | 7,990 | 2015/01/20 | 2010364 | ET ACTIVEX Orca Browser 1.1 ActiveX Command Execution Function call attempt; [1,2] | 7,989 | 2015/01/20 | 2010363 | ET ACTIVEX Orca Browser 1.1 Activex Command Execution clsid access attempt; [1,2] | 7,988 | 2015/01/20 | 2010362 | ET WEB_SPECIFIC_APPS AjaxPortal di.php pathtoserverdata Parameter Remote File Inclusion Attempt; [1,2] | 7,987 | 2015/01/20 | 2010361 | ET WEB_SPECIFIC_APPS FSphp pathwirte.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3] | 7,986 | 2015/01/20 | 2010360 | ET WEB_SPECIFIC_APPS FSphp navigation.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3] | 7,985 | 2015/01/20 | 2010359 | ET WEB_SPECIFIC_APPS FSphp FSphp.php FSPHP_LIB Parameter Remote File Inclusion Attempt; [1,2,3] | 7,984 | 2015/01/20 | 2010358 | ET ACTIVEX Macrovision FLEXnet Connect ActiveX Control Arbitrary File Download; [1,2] | 7,983 | 2015/01/20 | 2010357 | ET ACTIVEX NCTAVIFile V 1.6.2 ActiveX File Creation Function call attempt; [1,2] | 7,982 | 2015/01/20 | 2010356 | ET ACTIVEX NCTAVIFile V 1.6.2 Activex File Creation clsid access attempt; [1,2] | 7,981 | 2015/01/20 | 2010355 | ET WEB_SPECIFIC_APPS OBOphiX fonctions_racine.php chemin_lib parameter Remote File Inclusion Attempt; [1,2,3] | 7,980 | 2015/01/20 | 2010354 | ET WEB_SPECIFIC_APPS Achievo debugger.php config_atkroot parameter Remote File Inclusion Attempt; [1] | 7,979 | 2015/01/20 | 2010353 | ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter UPDATE SET SQL Injection Attempt; [1,2] | 7,978 | 2015/01/20 | 2010352 | ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter INSERT INTO SQL Injection Attempt; [1,2] | 7,977 | 2015/01/20 | 2010351 | ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter UNION SELECT SQL Injection Attempt; [1,2] | 7,976 | 2015/01/20 | 2010350 | ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter DELETE FROM SQL Injection Attempt; [1,2] | 7,975 | 2015/01/20 | 2010349 | ET WEB_SPECIFIC_APPS Joomla com_photoblog component category Parameter SELECT FROM SQL Injection Attempt; [1,2] | 7,974 | 2015/01/20 | 2010348 | ET TROJAN - Possible Zeus/Perkesh (.bin) configuration download; [1,2] | 7,973 | 2015/01/20 | 2010347 | ET TROJAN Fake/Rogue AV Landing Page Encountered; [1,2] | 7,972 | 2015/01/20 | 2010346 | ET TROJAN Ultimate HAckerz Team User-Agent (Made by UltimateHackerzTeam) - Likely Trojan Report; [1] | 7,971 | 2015/01/20 | 2010345 | ET TROJAN Chorns/Poison Ivy related Backdoor Keep Alive; [1] | 7,970 | 2015/01/20 | 2010344 | ET TROJAN Chorns/Poison Ivy related Backdoor Initial Connection; [1] | 7,969 | 2015/01/20 | 2010343 | ET SCAN pangolin SQL injection tool; [1] | 7,968 | 2015/01/20 | 2010342 | ET DELETED NACHA/Zeus Phishing Executable Download Attempt; [1,2] | 7,967 | 2015/01/20 | 2010341 | ET WEB_SPECIFIC_APPS OS Commerce 2.2 RC2 Potential Anonymous Remote Code Execution; [1,2,3] | 7,966 | 2015/01/20 | 2010339 | ET DELETED Potential Fake Anti-Virus Download Inst_58s6.exe; [1,2] | 7,965 | 2015/01/20 | 2010338 | ET DELETED offers.e-centives.com Coupon Printer; [1,2] | 7,964 | 2015/01/20 | 2010337 | ET TROJAN FakeAV Reporting - POST often to resolution|borders.php; [1,2] | 7,963 | 2015/01/20 | 2010334 | ET TROJAN Dosenjo/Kvadr Proxy Trojan Activity; [1,2,3,4] | 7,962 | 2015/01/20 | 2010333 | ET MALWARE User-Agent (CrazyBro); [1,2,3,4,5] | < 381 382 383 384 385 386 387 388 389 390 > |
|