번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
8,961 | 2015/01/20 | 2011470 | ET TROJAN Daurso FTP Credential Theft Reported; [1,2,3,4] |
8,960 | 2015/01/20 | 2011469 | ET DELETED MALVERTISING trafficbiztds.com - client receiving redirect to exploit kit; |
8,959 | 2015/01/20 | 2011468 | ET DELETED MALVERTISING trafficbiztds.com - client requesting redirect to exploit kit; |
8,958 | 2015/01/20 | 2011467 | ET WEB_SERVER /bin/ksh In URI Possible Shell Command Execution Attempt; |
8,957 | 2015/01/20 | 2011466 | ET WEB_SERVER /bin/tsh In URI Possible Shell Command Execution Attempt; |
8,956 | 2015/01/20 | 2011465 | ET WEB_SERVER /bin/sh In URI Possible Shell Command Execution Attempt; |
8,955 | 2015/01/20 | 2011464 | ET WEB_SERVER /bin/csh In URI Possible Shell Command Execution Attempt; |
8,954 | 2015/01/20 | 2011457 | ET WEB_CLIENT DLL or EXE File From Possible WebDAV Share, Possible DLL Preloading Exploit Attempt; [1,2,3,4,5,6] |
8,953 | 2015/01/20 | 2011456 | ET WEB_CLIENT PROPFIND Flowbit Set; |
8,952 | 2015/01/20 | 2011454 | ET WEB_SPECIFIC_APPS 4images global.php db_servertype Parameter Remote File Inclusion Attempt; [1] |
8,951 | 2015/01/20 | 2011453 | ET WEB_SPECIFIC_APPS PHP-Fusion maincore.php folder_level Parameter Local File Inclusion Attempt; [1] |
8,950 | 2015/01/20 | 2011452 | ET WEB_SPECIFIC_APPS Dance Studio Manager dailyview.php date Parameter Cross Site Scripting Attempt; [1] |
8,949 | 2015/01/20 | 2011451 | ET WEB_SPECIFIC_APPS Joomla JGrid Component File Inclusion Attempt; [1,2] |
8,948 | 2015/01/20 | 2011450 | ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter UPDATE SET SQL Injection Attempt; |
8,947 | 2015/01/20 | 2011429 | ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter INSERT INTO SQL Injection Attempt; |
8,946 | 2015/01/20 | 2011428 | ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter UNION SELECT SQL Injection Attempt; |
8,945 | 2015/01/20 | 2011427 | ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter DELETE FROM SQL Injection Attempt; |
8,944 | 2015/01/20 | 2011426 | ET WEB_SPECIFIC_APPS V-EVA Classified Script clsid Parameter SELECT FROM SQL Injection Attempt; |
8,943 | 2015/01/20 | 2011425 | ET DELETED Possible Attempt to Create MSSQL SOAP/HTTP Endpoint in URI to Allow for Operating System Interaction; [1] |
8,942 | 2015/01/20 | 2011424 | ET WEB_SERVER Possible SQL Injection Using MSSQL sp_configure Command; [1,2] |
8,941 | 2015/01/20 | 2011423 | ET WEB_SPECIFIC_APPS Cacti cacti/utilities.php Cross Site Scripting Attempt; |
8,940 | 2015/01/20 | 2011422 | ET VOIP Possible Modified Sipvicious OPTIONS Scan; [1,2] |
8,939 | 2015/01/20 | 2011421 | ET DELETED FAKEAV redirecting to fake scanner page - /?777; |
8,938 | 2015/01/20 | 2011420 | ET TROJAN FAKEAV client requesting image - sector.hdd.png; |
8,937 | 2015/01/20 | 2011419 | ET TROJAN FAKEAV landing page - sector.hdd.png no-repeat; |
8,936 | 2015/01/20 | 2011417 | ET DELETED MALVERTISING Hidden iframe Redirecting to SEO Driveby Site; |
8,935 | 2015/01/20 | 2011416 | ET DELETED General Trojan FakeAV Downloader; |
8,934 | 2015/01/20 | 2011415 | ET DELETED General Trojan Downloader Request Observed; [1,2,3] |
8,933 | 2015/01/20 | 2011414 | ET TROJAN Win32/Small.gen!AQ Communication with Controller; [1,2,3] |
8,932 | 2015/01/20 | 2011413 | ET WEB_SPECIFIC_APPS Group Office json.php fingerprint Parameter Remote Command Execution Attempt; [1] |
8,931 | 2015/01/20 | 2011412 | ET ACTIVEX Apple QuickTime _Marshaled_pUnk Backdoor Param Arbitrary Code Execution Attempt; [1] |
8,930 | 2015/01/20 | 2011411 | ET DNS DNS Query for Suspicious .co.kr Domain; [1] |
8,929 | 2015/01/20 | 2011410 | ET DNS DNS Query for Suspicious .cz.cc Domain; [1] |
8,928 | 2015/01/20 | 2011409 | ET DNS DNS Query for Suspicious .co.cc Domain; [1] |
8,927 | 2015/01/20 | 2011408 | ET DNS DNS Query for Suspicious .com.cn Domain; [1] |
8,926 | 2015/01/20 | 2011407 | ET DNS DNS Query for Suspicious .com.ru Domain; [1] |
8,925 | 2015/01/20 | 2011403 | ET TROJAN Yoyo-DDoS Bot HTTP Flood Attack Outbound; [1] |
8,924 | 2015/01/20 | 2011402 | ET TROJAN Yoyo-DDoS Bot HTTP Flood Attack Inbound; [1] |
8,923 | 2015/01/20 | 2011401 | ET DELETED Yoyo-DDoS Bot Unknown Command From CnC Server; [1] |
8,922 | 2015/01/20 | 2011400 | ET TROJAN Yoyo-DDoS Bot Execute SYN Flood Command Message From CnC Server; [1] |
8,921 | 2015/01/20 | 2011399 | ET TROJAN Yoyo-DDoS Bot Download and Launch Executable Message From CnC Server; [1] |
8,920 | 2015/01/20 | 2011398 | ET TROJAN Yoyo-DDoS Bot Execute DDoS Command From CnC Server; [1] |
8,919 | 2015/01/20 | 2011397 | ET TROJAN FakeYak or Related Infection Checkin 2; [1] |
8,918 | 2015/01/20 | 2011396 | ET TROJAN FakeYak or Related Infection Checkin 1; [1] |
8,917 | 2015/01/20 | 2011395 | ET TROJAN wisp backdoor detected reporting; |
8,916 | 2015/01/20 | 2011393 | ET MALWARE User-Agent (Microsoft Internet Explorer 6.0) Possible Reverse Web Shell; |
8,915 | 2015/01/20 | 2011392 | ET MALWARE User-Agent (http-get-demo) Possible Reverse Web Shell; |
8,914 | 2015/01/20 | 2011391 | ET MALWARE web shell detected; |
8,913 | 2015/01/20 | 2011390 | ET SCAN Nikto Scan Remote File Include Retrieval; [1] |
8,912 | 2015/01/20 | 2011389 | ET SCAN w3af Scan Remote File Include Retrieval; [1] |
< 361 362 363 364 365 366 367 368 369 370 > |