|
|
|
번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 6,611 | 2015/01/20 | 2008811 | ET ACTIVEX MW6 DataMatrix DataMatrix.dll ActiveX Control Multiple Arbitrary File Overwrite; [1,2] | 6,610 | 2015/01/20 | 2008810 | ET ACTIVEX MW6 PDF417 MW6PDF417.dll ActiveX Control Multiple Arbitrary File Overwrite; [1,2] | 6,609 | 2015/01/20 | 2008809 | ET ACTIVEX MW6 Technologies Barcode ActiveX Barcode.dll Multiple Arbitrary File Overwrite; [1,2] | 6,608 | 2015/01/20 | 2008808 | ET TROJAN DNS Changer.bnm/Downloader.bnm Second CnC Channel Traffic; [1] | 6,607 | 2015/01/20 | 2008807 | ET TROJAN DNS Changer.bnm/Downloader.bnm Second CnC Channel Start; [1] | 6,606 | 2015/01/20 | 2008806 | ET TROJAN DNS Changer.bnm/Downloader.bnm CnC Channel Start Response; [1] | 6,605 | 2015/01/20 | 2008805 | ET TROJAN DNS Changer.bnm/Downloader.bnm CnC Channel Start; [1] | 6,604 | 2015/01/20 | 2008802 | ET DELETED Possible Downadup/Conficker-A Worm Activity; [1,2,3] | 6,603 | 2015/01/20 | 2008798 | ET MALWARE Zenosearch Malware Checkin HTTP POST (2); [1] | 6,602 | 2015/01/20 | 2008797 | ET TROJAN Suspicious User-Agent (miip); [1] | 6,601 | 2015/01/20 | 2008795 | ET POLICY TeamViewer Keep-alive inbound; [1,2,3] | 6,600 | 2015/01/20 | 2008794 | ET POLICY TeamViewer Keep-alive outbound; [1,2,3] | 6,599 | 2015/01/20 | 2008793 | ET WEB_SPECIFIC_APPS SFS EZ BIZ PRO track.php id Parameter Remote SQL Injection; [1,2,3] | 6,598 | 2015/01/20 | 2008792 | ET ACTIVEX Microsoft DebugDiag CrashHangExt.dll ActiveX Control Remote Denial of Service; [1] | 6,597 | 2015/01/20 | 2008791 | ET ACTIVEX Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite; [1,2] | 6,596 | 2015/01/20 | 2008790 | ET ACTIVEX DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow; [1,2] | 6,595 | 2015/01/20 | 2008789 | ET ACTIVEX DB Software Laboratory VImpX.ocx ActiveX Control Multiple Insecure Methods; [1,2] | 6,594 | 2015/01/20 | 2008788 | ET WEB_SPECIFIC_APPS e107 BLOG Engine macgurublog.php uid Parameter SQL Injection; [1,2] | 6,593 | 2015/01/20 | 2008787 | ET WEB_SPECIFIC_APPS All In One Control Panel poll_id parameter SQL Injection; [1,2,3] | 6,592 | 2015/01/20 | 2008786 | ET WEB_SPECIFIC_APPS PozScripts Classified Auctions id parameter SQL Injection; [1,2,3] | 6,591 | 2015/01/20 | 2008785 | ET WEB_SPECIFIC_APPS Aj Square RSS Reader url SQL Injection; [1,2,3] | 6,590 | 2015/01/20 | 2008784 | ET DELETED Lighty Variant or UltimateDefender POST; [1] | 6,589 | 2015/01/20 | 2008783 | ET DELETED Possible Trojan File Download - Rar Requested but not received; [1,2] | 6,588 | 2015/01/20 | 2008782 | ET POLICY Possible Trojan File Download bad rar file header (not a valid rar file); [1,2] | 6,587 | 2015/01/20 | 2008781 | ET DELETED Set flow on rar file get; [1] | 6,586 | 2015/01/20 | 2008780 | ET DELETED Unknown Keepalive in; [1] | 6,585 | 2015/01/20 | 2008779 | ET DELETED Unknown Keepalive out; [1] | 6,584 | 2015/01/20 | 2008777 | ET EXPLOIT GuildFTPd CWD and LIST Command Heap Overflow - POC-2; [1,2] | 6,583 | 2015/01/20 | 2008776 | ET EXPLOIT GuildFTPd CWD and LIST Command Heap Overflow - POC-1; [1,2] | 6,582 | 2015/01/20 | 2008772 | ET DELETED Unknown Trojan P2P Request; [1,2] | 6,581 | 2015/01/20 | 2008771 | ET DELETED Unknown Trojan P2P Download Request; [1,2] | 6,580 | 2015/01/20 | 2008770 | ET DELETED Unknown Trojan P2P Data Download; [1,2] | 6,579 | 2015/01/20 | 2008767 | ET TROJAN Kangkio User-Agent (lsosss); [1] | 6,578 | 2015/01/20 | 2008766 | ET DELETED Generic Downloader Checkin Url Detected; [1] | 6,577 | 2015/01/20 | 2008765 | ET TROJAN Brontok/Joseray User-Agent Detected (Joseray.A3 Browser); [1] | 6,576 | 2015/01/20 | 2008760 | ET TROJAN Insidebar.co.kr Related Infection Checkin; [1] | 6,575 | 2015/01/20 | 2008759 | ET MALWARE Matcash Trojan Related Spyware Code Download; [1] | 6,574 | 2015/01/20 | 2008758 | ET TROJAN Mcboo.com/Bundlext.com related Trojan Checkin URL; [1] | 6,573 | 2015/01/20 | 2008757 | ET MALWARE Zenosearch Malware Checkin HTTP POST; [1] | 6,572 | 2015/01/20 | 2008756 | ET TROJAN Suspicious User-Agent (Kvadrlson 1.0); [1] | 6,571 | 2015/01/20 | 2008755 | ET TROJAN Autorun.qvi Related HTTP Get on Off Port; [1] | 6,570 | 2015/01/20 | 2008754 | ET TROJAN Possible Rar'd Malware sent when remote host claims to send an Image; [1] | 6,569 | 2015/01/20 | 2008753 | ET MALWARE AdWare.Win32.Yokbar Checkin URL; [1] | 6,568 | 2015/01/20 | 2008752 | ET TROJAN AdWare.Win32.Yokbar User-Agent Detected (YOK Agent); [1] | 6,567 | 2015/01/20 | 2008750 | ET DELETED Buzus FTP Log Upload; [1] | 6,566 | 2015/01/20 | 2008749 | ET TROJAN Suspicious User-Agent (checkonline); [1] | 6,565 | 2015/01/20 | 2008748 | ET POLICY Possible External FreeGate DNS Query; [1] | 6,564 | 2015/01/20 | 2008747 | ET POLICY Possible External FreeGate DNS Query; [1] | 6,563 | 2015/01/20 | 2008746 | ET POLICY Possible External FreeGate DNS Query; [1] | 6,562 | 2015/01/20 | 2008745 | ET POLICY Possible External FreeGate DNS Query; [1] | < 411 412 413 414 415 416 417 418 419 420 > |
|
Copyright ⓒ 2010 . All Rights Reserved.
|
|