시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,7612015/01/20 2011200  ET ACTIVEX AVTECH Software ActiveX SendCommand Method Buffer Overflow Attempt; [1,2,3
8,7602015/01/20 2011199  ET TROJAN Outbound AVISOSVB MSSQL Request; [1,2
8,7592015/01/20 2011198  ET WEB_SPECIFIC_APPS Possible HP OpenView Network Node Manager Getnnmdata.exe Invalid Hostname Remote Code Execution Attempt; [1,2
8,7582015/01/20 2011197  ET WEB_SPECIFIC_APPS Possible HP OpenView Network Node Manager Getnnmdata.exe Invalid MaxAge Remote Code Execution Attempt; [1,2
8,7572015/01/20 2011196  ET WEB_SPECIFIC_APPS Possible HP OpenView Network Node Manager Getnnmdata.exe Invalid ICount Remote Code Execution Attempt; [1,2
8,7562015/01/20 2011195  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module ipmi_bladestatus.php Cross Site Scripting Attempt; [1,2
8,7552015/01/20 2011194  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module blade_leds.php Cross Site Scripting Attempt; [1,2
8,7542015/01/20 2011193  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module power_module.php Cross Site Scripting Attempt; [1,2
8,7532015/01/20 2011192  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module pm_temp.php Cross Site Scripting Attempt; [1,2
8,7522015/01/20 2011191  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module power_management_policy_options.php Cross Site Scripting Attempt; [1,2
8,7512015/01/20 2011190  ET WEB_SPECIFIC_APPS Possible IBM BladeCenter Management Module cindefn.php Cross Site Scripting Attempt; [1,2
8,7502015/01/20 2011189  ET WEB_SPECIFIC_APPS Possible Cisco IOS HTTP Server Cross Site Scripting Attempt; [1,2,3
8,7492015/01/20 2011188  ET TROJAN Nine Ball User-Agent Detected (NQX315); [1
8,7482015/01/20 2011187  ET DELETED Nine Ball Infection Posting Data; [1,2
8,7472015/01/20 2011186  ET TROJAN Nine Ball Infection ya.ru Post; [1,2
8,7462015/01/20 2011185  ET DELETED Nine Ball Infection Ping Outbound; [1
8,7452015/01/20 2011184  ET TROJAN Phoenix Exploit Kit VBscript download; [1
8,7442015/01/20 2011183  ET DELETED Phoenix Exploit Kit malware payload download; [1
8,7432015/01/20 2011182  ET TROJAN Phoenix Exploit Kit - libtiff.pdf; [1
8,7422015/01/20 2011181  ET TROJAN Phoenix Exploit Kit pdfswf.pdf; [1
8,7412015/01/20 2011180  ET TROJAN Phoenix Exploit Kit pdfopen.pdf; [1
8,7402015/01/20 2011179  ET TROJAN Generic Checkin - MSCommonInfoEx; [1
8,7392015/01/20 2011178  ET DELETED FakeAV Download with Cookie WinSec; [1,2
8,7382015/01/20 2011176  ET DELETED MaMa CaSpEr RFI Scan; [1
8,7372015/01/20 2011175  ET WEB_SERVER Casper Bot Search RFI Scan; [1
8,7362015/01/20 2011174  ET WEB_SERVER SQL Injection Attempt (Agent CZxt2s); [1
8,7352015/01/20 2011173  ET ACTIVEX Windows Help Center Arbitrary Command Execution Exploit Attempt; [1,2
8,7342015/01/20 2011172  ET WEB_SPECIFIC_APPS PHP-Nuke FriendSend module sid Parameter UPDATE SET SQL Injection Attempt; [1,2
8,7332015/01/20 2011171  ET WEB_SPECIFIC_APPS PHP-Nuke FriendSend module sid Parameter INSERT INTO SQL Injection Attempt; [1,2
8,7322015/01/20 2011170  ET WEB_SPECIFIC_APPS PHP-Nuke FriendSend module sid Parameter UNION SELECT SQL Injection Attempt; [1,2
8,7312015/01/20 2011169  ET WEB_SPECIFIC_APPS PHP-Nuke FriendSend module sid Parameter DELETE FROM SQL Injection Attempt; [1,2
8,7302015/01/20 2011168  ET WEB_SPECIFIC_APPS PHP-Nuke FriendSend module sid Parameter SELECT FROM SQL Injection Attempt; [1,2
8,7292015/01/20 2011167  ET WEB_SPECIFIC_APPS 29o3 CMS layoutParser.php LibDir Parameter Remote File Inclusion Attempt; [1,2
8,7282015/01/20 2011165  ET WEB_SPECIFIC_APPS 29o3 CMS layoutHeaderFuncs.php LibDir Parameter Remote File Inclusion Attempt; [1,2
8,7272015/01/20 2011164  ET WEB_SPECIFIC_APPS 29o3 CMS pageDescriptionObject.php LibDir Parameter Remote File Inclusion Attempt; [1,2
8,7262015/01/20 2011162  ET TROJAN IRC Potential bot update/download via ftp command; [1
8,7252015/01/20 2011161  ET WEB_SPECIFIC_APPS HotNews hnmain.inc.php3 incdir Parameter Remote File Inclusion Attempt; [1,2,3
8,7242015/01/20 2011160  ET WEB_SERVER Apache Axis2 xsd Parameter Directory Traversal Attempt; [1
8,7232015/01/20 2011159  ET WEB_SPECIFIC_APPS RJ-iTop Network Vulnerabilities Scan System id UPDATE SET SQL Injection Attempt; [1,2
8,7222015/01/20 2011158  ET WEB_SPECIFIC_APPS RJ-iTop Network Vulnerabilities Scan System id INSERT INTO SQL Injection Attempt; [1,2
8,7212015/01/20 2011157  ET WEB_SPECIFIC_APPS RJ-iTop Network Vulnerabilities Scan System id UNION SELECT SQL Injection Attempt; [1,2
8,7202015/01/20 2011156  ET WEB_SPECIFIC_APPS RJ-iTop Network Vulnerabilities Scan System id DELETE FROM SQL Injection Attempt; [1,2
8,7192015/01/20 2011155  ET WEB_SPECIFIC_APPS RJ-iTop Network Vulnerabilities Scan System id SELECT FROM SQL Injection Attempt; [1,2
8,7182015/01/20 2011154  ET WEB_SPECIFIC_APPS Ektron CMS400.NET medialist.aspx selectids Parameter Cross Site Scripting Attempt; [1,2
8,7172015/01/20 2011153  ET WEB_SPECIFIC_APPS Ektron CMS400.NET reterror.aspx info Parameter Cross Site Scripting Attempt; [1,2
8,7162015/01/20 2011152  ET WEB_SPECIFIC_APPS Consona Products n6plugindestructor.asp Cross Site Scripting Attempt; [1,2
8,7152015/01/20 2011151  ET DELETED UPS Spam Inbound Variant 3; [1
8,7142015/01/20 2011150  ET DELETED UPS Spam Inbound Variant 2; [1
8,7132015/01/20 2011149  ET MALWARE User-Agent (webcount); [1
8,7122015/01/20 2011148  ET TROJAN Unknown Malware Download Request; [1,2
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.