번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 8,111 | 2015/01/20 | 2010492 | ET DOS Possible MYSQL SELECT WHERE to User Variable Denial Of Service Attempt; [1,2,3,4] | 8,110 | 2015/01/20 | 2010491 | ET DOS Possible MYSQL GeomFromWKB() function Denial Of Service Attempt; [1,2,3,4] | 8,109 | 2015/01/20 | 2010490 | ET TROJAN Vundo User-Agent Check-in; [1,2] | 8,108 | 2015/01/20 | 2010489 | ET DELETED Potential Inbound NTP denial-of-service attempt (repeated mode 7 reply); [1,2] | 8,107 | 2015/01/20 | 2010488 | ET DELETED Potential Inbound NTP denial-of-service attempt (repeated mode 7 request); [1,2] | 8,106 | 2015/01/20 | 2010487 | ET DOS Potential Inbound NTP denial-of-service attempt (repeated mode 7 reply); [1,2] | 8,105 | 2015/01/20 | 2010486 | ET DOS Potential Inbound NTP denial-of-service attempt (repeated mode 7 request); [1,2] | 8,104 | 2015/01/20 | 2010485 | ET WEB_SPECIFIC_APPS phptraverse mp3_id.php GLOBALS Parameter Remote File Inclusion Attempt; [1,2] | 8,103 | 2015/01/20 | 2010484 | ET WEB_SPECIFIC_APPS FormMailer formmailer.admin.inc.php BASE_DIR Parameter Remote File Inclusion Attempt; [1,2] | 8,102 | 2015/01/20 | 2010483 | ET ACTIVEX IBM Access Support ActiveX GetXMLValue Stack Overflow Attempt; [1,2,3,4] | 8,101 | 2015/01/20 | 2010482 | ET ACTIVEX IBM Access Support ActiveX GetXMLValue Stack Overflow Attempt; [1,2,3,4] | 8,100 | 2015/01/20 | 2010481 | ET ACTIVEX SAP AG SAPgui EAI WebViewer2D ActiveX stack buffer overflow CLSid Access; [1,2] | 8,099 | 2015/01/20 | 2010480 | ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter UPDATE SET SQL Injection Attempt; [1,2] | 8,098 | 2015/01/20 | 2010479 | ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter INSERT INTO SQL Injection Attempt; [1,2] | 8,097 | 2015/01/20 | 2010478 | ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter UNION SELECT SQL Injection Attempt; [1,2] | 8,096 | 2015/01/20 | 2010477 | ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter DELETE FROM SQL Injection Attempt; [1,2] | 8,095 | 2015/01/20 | 2010476 | ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter SELECT FROM SQL Injection Attempt; [1,2] | 8,094 | 2015/01/20 | 2010475 | ET WEB_SPECIFIC_APPS KR-Web krgourl.php DOCUMENT_ROOT Parameter Remote File Inclusion Attempt; [1,2] | 8,093 | 2015/01/20 | 2010474 | ET WEB_SPECIFIC_APPS Joomla eZine Component d4m_ajax_pagenav.php Remote File Inclusion Attempt; [1] | 8,092 | 2015/01/20 | 2010473 | ET WEB_SPECIFIC_APPS p-Table for WordPress wptable-tinymce.php ABSPATH Parameter RFI Attempt; [1,2] | 8,091 | 2015/01/20 | 2010472 | ET ACTIVEX SAP GUI vsflexGrid ActiveX CellFontName method Buffer Overflow CLSID Attempt; [1,2,3] | 8,090 | 2015/01/20 | 2010471 | ET ACTIVEX SAP GUI vsflexGrid ActiveX EditText method Buffer Overflow CLSID Attempt; [1,2,3] | 8,089 | 2015/01/20 | 2010470 | ET ACTIVEX SAP GUI vsflexGrid ActiveX EditSelText method Buffer Overflow CLSID Attempt; [1,2,3] | 8,088 | 2015/01/20 | 2010469 | ET ACTIVEX SAP GUI vsflexGrid ActiveX Text method Buffer Overflow CLSID Attempt; [1,2,3] | 8,087 | 2015/01/20 | 2010468 | ET ACTIVEX SAP GUI vsflexGrid ActiveX Archive method Buffer Overflow CLSID Attempt; [1,2,3] | 8,086 | 2015/01/20 | 2010467 | ET ACTIVEX SAP GUI vsflexGrid ActiveX Buffer Overflow Function call Attempt; [1,2,3] | 8,085 | 2015/01/20 | 2010466 | ET WEB_SPECIFIC_APPS PointComma pctemplate.php pcConfig Parameter Remote File Inclusion Attempt; [1,2] | 8,084 | 2015/01/20 | 2010465 | ET TROJAN Potential Fake AV Download (download/install.php); [1,2,3,4] | 8,083 | 2015/01/20 | 2010463 | ET WEB_SERVER RFI Scanner Success (Fx29ID); [1,2] | 8,082 | 2015/01/20 | 2010462 | ET WEB_SERVER Possible Barracuda IM Firewall smtp_test.cgi Cross-Site Scripting Attempt; [1,2] | 8,081 | 2015/01/20 | 2010461 | ET MALWARE User-Agent (MSIE7 na); [1] | 8,080 | 2015/01/20 | 2010460 | ET WEB_SERVER Cisco BBSM Captive Portal AccesCodeStart.asp Cross-Site Scripting Attempt; [1,2] | 8,079 | 2015/01/20 | 2010458 | ET TROJAN Dropper Checkin (often scripts.dlv4.com related); [1] | 8,078 | 2015/01/20 | 2010457 | ET WEB_SERVER Possible Cisco Adaptive Security Appliance Web VPN FTP or CIFS Authentication Form Phishing Attempt; [1,2] | 8,077 | 2015/01/20 | 2010456 | ET ACTIVEX SonicWALL SSL VPN Client Remote ActiveX AddRouteEntry Attempt; [1,2] | 8,076 | 2015/01/20 | 2010454 | ET ATTACK_RESPONSE Metasploit/Meterpreter - Sending metsrv.dll to Compromised Host; [1] | 8,075 | 2015/01/20 | 2010453 | ET TROJAN Potential Fake AV GET installer_1.exe; [1,2] | 8,074 | 2015/01/20 | 2010452 | ET TROJAN Potential Fake AV GET installer.1.exe; [1,2] | 8,073 | 2015/01/20 | 2010450 | ET TROJAN Potential Gemini/Fake AV Download URL Detected; [1,2] | 8,072 | 2015/01/20 | 2010449 | ET DELETED MALWARE Potential Malware Download, exploit redirect; [1,2] | 8,071 | 2015/01/20 | 2010448 | ET DELETED MALWARE Potential Malware Download, trojan zbot; [1,2] | 8,070 | 2015/01/20 | 2010447 | ET DELETED MALWARE Potential Malware Download, rogue antivirus (IAInstall.exe); [1,2] | 8,069 | 2015/01/20 | 2010446 | ET DELETED MALWARE Potential Malware Download, loadjavad.php exploit; [1,2] | 8,068 | 2015/01/20 | 2010444 | ET DELETED MALWARE Potential Malware Download, pdf exploit; [1,2] | 8,067 | 2015/01/20 | 2010442 | ET TROJAN Possible Storm Variant HTTP Post (U); [1,2,3] | 8,066 | 2015/01/20 | 2010441 | ET TROJAN Possible Storm Variant HTTP Post (S); [1,2,3] | 8,065 | 2015/01/20 | 2010440 | ET DELETED Potential Malware Download flash-HQ-plugin exe; [1,2] | 8,064 | 2015/01/20 | 2010439 | ET TROJAN Generic Trojan Checkin (UA VBTagEdit); [1] | 8,063 | 2015/01/20 | 2010438 | ET MALWARE Possible Malicious Applet Access (justexploit kit); [1,2] | 8,062 | 2015/01/20 | 2010437 | ET SHELLCODE METASPLOIT BSD SPARC Reverse shell (Not Encoded 3); [1] | < 381 382 383 384 385 386 387 388 389 390 > |
|