시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
7,5612015/01/20 2009877  ET WEB_SPECIFIC_APPS VirtueMart Google Base Component admin.googlebase.php Remote File Inclusion; [1,2
7,5602015/01/20 2009876  ET WEB_SPECIFIC_APPS Dokuwiki doku.php config_cascade Local File Inclusion; [1,2
7,5592015/01/20 2009875  ET WEB_SPECIFIC_APPS cpCommerce _functions.php GLOBALS Parameter Local File Inclusion; [1,2
7,5582015/01/20 2009874  ET WEB_SPECIFIC_APPS cpCommerce _functions.php GLOBALS Parameter Remote File Inclusion; [1,2
7,5572015/01/20 2009873  ET WEB_SPECIFIC_APPS PHPauction GPL settings.inc.php include_path Parameter Remote File Inclusion; [1,2,3
7,5562015/01/20 2009872  ET WEB_SPECIFIC_APPS PHPauction GPL messages.inc.php include_path Parameter Remote File Inclusion; [1,2,3
7,5552015/01/20 2009871  ET WEB_SPECIFIC_APPS PHPauction GPL converter.inc.php include_path Parameter Remote File Inclusion; [1,2,3
7,5542015/01/20 2009870  ET WEB_SPECIFIC_APPS XRMS CRM workflow-activities.php include_directory Remote File Inclusion; [1,2,3
7,5532015/01/20 2009869  ET ACTIVEX Possible SmartVMD VideoMovement.dll Buffer Overflow Attempt; [1,2
7,5522015/01/20 2009868  ET ACTIVEX Possible Acer LunchApp Arbitrary Code Exucution Attempt; [1,2,3,4
7,5512015/01/20 2009867  ET TROJAN Suspicious User-Agent (Mozilla/3.0 (compatible)); [1
7,5502015/01/20 2009864  ET DELETED Banker Trojan CnC Server Ping; [1
7,5492015/01/20 2009863  ET TROJAN Banker Trojan CnC Hello Command; [1
7,5482015/01/20 2009862  ET TROJAN Banker Trojan CnC AddNew Command; [1
7,5472015/01/20 2009861  ET MALWARE ErrorNuker FakeAV User-Agent (ERRN2004 (Windows XP)); [1
7,5462015/01/20 2009860  ET EXPLOIT IIS FTP Exploit - NLST Globbing Exploit; [1,2
7,5452015/01/20 2009858  ET ACTIVEX Possible PPStream MList.ocx Buffer Overflow Attempt; [1,2
7,5442015/01/20 2009857  ET ACTIVEX Awingsoft Web3D Player Remote Buffer Overflow; [1,2,3,4
7,5432015/01/20 2009856  ET WEB_SPECIFIC_APPS Flash Quiz high_score.php quiz Parameter SQL Injection; [1,2
7,5422015/01/20 2009855  ET WEB_SPECIFIC_APPS Flash Quiz question.php order_number Parameter SQL Injection; [1,2
7,5412015/01/20 2009854  ET WEB_SPECIFIC_APPS Flash Quiz question.php quiz Parameter SQL Injection; [1,2
7,5402015/01/20 2009853  ET WEB_SPECIFIC_APPS Flash Quiz results_table_web.php quiz Parameter SQL Injection; [1,2
7,5392015/01/20 2009852  ET WEB_SPECIFIC_APPS Flash Quiz high_score_web.php quiz Parameter SQL Injection; [1,2
7,5382015/01/20 2009851  ET WEB_SPECIFIC_APPS Flash Quiz answers.php order_number Parameter SQL Injection; [1,2
7,5372015/01/20 2009850  ET WEB_SPECIFIC_APPS Flash Quiz answers.php quiz Parameter SQL Injection; [1,2
7,5362015/01/20 2009849  ET WEB_SPECIFIC_APPS Flash Quiz num_questions.php quiz Parameter SQL Injection; [1,2
7,5352015/01/20 2009848  ET WEB_SPECIFIC_APPS Dragoon header.inc.php root Parameter Remote File Inclusion; [1,2
7,5342015/01/20 2009847  ET ACTIVEX Symantec Security Check RuFSI ActiveX Control Buffer Overflow; [1,2,3
7,5332015/01/20 2009846  ET WEB_SPECIFIC_APPS WB News global.php config Parameter Remote File Inclusion; [1,2,3
7,5322015/01/20 2009845  ET WEB_SPECIFIC_APPS WB News SendFriend.php config Parameter Remote File Inclusion; [1,2
7,5312015/01/20 2009844  ET WEB_SPECIFIC_APPS WB News News.php config Parameter Remote File Inclusion -2; [1,2
7,5302015/01/20 2009843  ET WEB_SPECIFIC_APPS WB News news.php config Parameter Remote File Inclusion -1; [1,2
7,5292015/01/20 2009842  ET WEB_SPECIFIC_APPS WB News Comments.php config Parameter Remote File Inclusion -2; [1,2
7,5282015/01/20 2009841  ET WEB_SPECIFIC_APPS WB News comments.php config Parameter Remote File Inclusion -1; [1,2
7,5272015/01/20 2009840  ET WEB_SPECIFIC_APPS WB News Archive.php config Parameter Remote File Inclusion -2; [1,2
7,5262015/01/20 2009839  ET WEB_SPECIFIC_APPS WB News archive.php config Parameter Remote File Inclusion -1; [1,2
7,5252015/01/20 2009838  ET WEB_SPECIFIC_APPS WB News search.php config Parameter Remote File Inclusion; [1,2
7,5242015/01/20 2009837  ET DELETED OWASP Joomla Vulnerability Scanner Detected; [1,2
7,5232015/01/20 2009836  ET WEB_SPECIFIC_APPS Joomla portalid Component DELETE FROM SQL Injection; [1,2,3
7,5222015/01/20 2009835  ET WEB_SPECIFIC_APPS Joomla portalid Component SELECT FROM SQL Injection; [1,2,3
7,5212015/01/20 2009834  ET WEB_SPECIFIC_APPS Joomla portalid Component UNION SELECT SQL Injection; [1,2,3
7,5202015/01/20 2009833  ET SCAN WITOOL SQL Injection Scan; [1,2
7,5192015/01/20 2009832  ET SCAN DCERPC rpcmgmt ifids Unauthenticated BIND; [1,2,3,4
7,5182015/01/20 2009831  ET MALWARE Topgame-online.com Ruch Casino Install User-Agent (RichCasino); [1
7,5172015/01/20 2009830  ET TROJAN Win32/Wombot.A checkin Possible Bruteforcer for Web Forms and Accounts - HTTP POST; [1,2
7,5162015/01/20 2009829  ET TROJAN Virut/Virutas/Virtob/QQHelper Dropper Family - HTTP GET; [1,2,3,4
7,5152015/01/20 2009828  ET EXPLOIT Possible IIS FTP Exploit attempt - Large SITE command; [1,2
7,5142015/01/20 2009827  ET SCAN Pavuk User Agent Detected - Website Mirroring Tool for Off-line Analysis; [1,2
7,5132015/01/20 2009826  ET DELETED Generic Backdoor Retrieve Instructions/Configs - HTTP GET; [1
7,5122015/01/20 2009825  ET TROJAN Win32.VB.tdq - Fake User-Agent; [1,2,3
< 391  392  393  394  395  396  397  398  399  400 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.