시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
8,6612015/01/20 2011094  ET WEB_SPECIFIC_APPS Manage Engine Service Desk Plus WorkOrder.do INSERT INTO SQL Injection Attempt; [1,2,3
8,6602015/01/20 2011093  ET WEB_SPECIFIC_APPS Manage Engine Service Desk Plus WorkOrder.do UNION SELECT SQL Injection Attempt; [1,2,3
8,6592015/01/20 2011092  ET WEB_SPECIFIC_APPS Manage Engine Service Desk Plus WorkOrder.do DELETE FROM SQL Injection Attempt; [1,2,3
8,6582015/01/20 2011091  ET WEB_SPECIFIC_APPS Manage Engine Service Desk Plus WorkOrder.do SELECT FROM SQL Injection Attempt; [1,2,3
8,6572015/01/20 2011090  ET POLICY User-Agent Recuva (Recuva); [1,2
8,6562015/01/20 2011089  ET SCAN DavTest WebDav Vulnerability Scanner Default User Agent Detected; [1,2,3
8,6552015/01/20 2011088  ET SCAN Possible DavTest WebDav Vulnerability Scanner Initial Check Detected; [1,2,3
8,6542015/01/20 2011087  ET MALWARE User-Agent (gomtour); [1
8,6532015/01/20 2011086  ET TROJAN Trojan-Dropper.Win32.Flystud; [1
8,6522015/01/20 2011085  ET POLICY HTTP Redirect to IPv4 Address; [1
8,6512015/01/20 2011084  ET DELETED User-Agent (BlueSky); [1
8,6502015/01/20 2011083  ET WEB_SPECIFIC_APPS McAfee Email Gateway QtnType Parameter Cross Site Scripting Attempt; [1,2
8,6492015/01/20 2011082  ET WEB_SPECIFIC_APPS McAfee Email Gateway queueMsgType Parameter Cross Site Scripting Attempt; [1,2
8,6482015/01/20 2011081  ET WEB_SPECIFIC_APPS Joomla FaceBook Component face_id Parameter UPDATE SET SQL Injection Attempt; [1,2,3
8,6472015/01/20 2011080  ET WEB_SPECIFIC_APPS Joomla FaceBook Component face_id Parameter INSERT INTO SQL Injection Attempt; [1,2,3
8,6462015/01/20 2011079  ET WEB_SPECIFIC_APPS Joomla FaceBook Component face_id Parameter UNION SELECT SQL Injection Attempt; [1,2,3
8,6452015/01/20 2011078  ET WEB_SPECIFIC_APPS Joomla FaceBook Component face_id Parameter DELETE FROM SQL Injection Attempt; [1,2,3
8,6442015/01/20 2011077  ET WEB_SPECIFIC_APPS Joomla FaceBook Component face_id Parameter SELECT FROM SQL Injection Attempt; [1,2,3
8,6432015/01/20 2011075  ET ACTIVEX HP Operations Manager SourceView ActiveX LoadFile/SaveFile Method Buffer Overflow Attempt; [1,2,3
8,6422015/01/20 2011073  ET WEB_SERVER Microsoft SharePoint Server 2007 _layouts/help.aspx Cross Site Scripting Attempt; [1,2,3,4,5
8,6412015/01/20 2011072  ET TROJAN Fruspam polling for IP likely infected; [1,2
8,6402015/01/20 2011071  ET WEB_SPECIFIC_APPS WordPress Copperleaf Photolog postid Parameter UNION SELECT SQL Injection Attempt; [1,2
8,6392015/01/20 2011067  ET WEB_SPECIFIC_APPS Joomla wgPicasa Component controller Parameter Local File Inclusion Attempt; [1,2,3
8,6382015/01/20 2011066  ET DELETED TROJAN SEO HTTP REFERER landing capture rewrite, likely Fake AV; [1
8,6372015/01/20 2011065  ET WEB_SPECIFIC_APPS SurgeFTP surgeftpmgr.cgi classid Parameter Cross Site Scripting Attempt; [1,2,3
8,6362015/01/20 2011063  ET WEB_SPECIFIC_APPS Mp3 Online Id Tag Editor module.archive.gzip.php Remote File Inclusion Attempt; [1,2
8,6352015/01/20 2011062  ET WEB_SPECIFIC_APPS Mp3 Online Id Tag Editor getid3.php Remote File Inclusion Attempt; [1,2
8,6342015/01/20 2011061  ET WEB_SPECIFIC_APPS Oracle E-Business Suite Financials jtfwcpnt.jsp UPDATE SET SQL Injection Attempt; [1
8,6332015/01/20 2011060  ET WEB_SPECIFIC_APPS Oracle E-Business Suite Financials jtfwcpnt.jsp INSERT INTO SQL Injection Attempt; [1
8,6322015/01/20 2011059  ET WEB_SPECIFIC_APPS Oracle E-Business Suite Financials jtfwcpnt.jsp UNION SELECT SQL Injection Attempt; [1
8,6312015/01/20 2011058  ET WEB_SPECIFIC_APPS Oracle E-Business Suite Financials jtfwcpnt.jsp DELETE FROM SQL Injection Attempt; [1
8,6302015/01/20 2011057  ET WEB_SPECIFIC_APPS Oracle E-Business Suite Financials jtfwcpnt.jsp SELECT FROM SQL Injection Attempt; [1
8,6292015/01/20 2011055  ET ACTIVEX Possible EDraw Flowchart ActiveX Control OpenDocument Method Remote Code Execution Attempt; [1
8,6282015/01/20 2011054  ET WEB_SPECIFIC_APPS Possible CactuShop User Invoices Persistent XSS Attempt; [1,2
8,6272015/01/20 2011053  ET WEB_CLIENT Possible Java Deployment Toolkit Launch Method Remote Code Execution Attempt; [1,2,3
8,6262015/01/20 2011052  ET WEB_SPECIFIC_APPS Softsaurus CMS subHeader.php objects_path Parameter Remote File Inclusion -2; [1,2
8,6252015/01/20 2011051  ET WEB_SPECIFIC_APPS Softsaurus CMS subHeader.php objects_path Parameter Remote File Inclusion -1; [1,2
8,6242015/01/20 2011050  ET ACTIVEX Liquid XML Studio 2010 OpenFile Method Remote Heap Overflow Attempt; [1,2
8,6232015/01/20 2011049  ET ACTIVEX IncrediMail 2.0 Authenticate Method Remote Buffer Overflow Function Call Attempt; [1,2,3
8,6222015/01/20 2011048  ET ACTIVEX IncrediMail 2.0 Authenticate Method Remote Buffer Overflow Attempt; [1,2,3
8,6212015/01/20 2011047  ET WEB_SPECIFIC_APPS WordPress Copperleaf Photolog postid Parameter UPDATE SET SQL Injection Attempt; [1,2
8,6202015/01/20 2011046  ET WEB_SPECIFIC_APPS WordPress Copperleaf Photolog postid Parameter INSERT INTO SQL Injection Attempt; [1,2
8,6192015/01/20 2011045  ET WEB_SPECIFIC_APPS WordPress Copperleaf Photolog postid Parameter DELETE FROM SQL Injection Attempt; [1,2
8,6182015/01/20 2011044  ET WEB_SPECIFIC_APPS WordPress Copperleaf Photolog postid Parameter SELECT FROM SQL Injection Attempt; [1,2
8,6172015/01/20 2011042  ET WEB_SERVER MYSQL SELECT CONCAT SQL Injection Attempt; [1,2,3
8,6162015/01/20 2011041  ET WEB_SERVER MYSQL Benchmark Command in URI to Consume Server Resources; [1,2
8,6152015/01/20 2011040  ET WEB_SERVER Possible Usage of MYSQL Comments in URI for SQL Injection; [1,2,3
8,6142015/01/20 2011039  ET WEB_SERVER Possible INSERT VALUES SQL Injection Attempt; [1,2,3
8,6132015/01/20 2011037  ET WEB_SERVER Possible Attempt to Get SQL Server Version in URI using SELECT VERSION; [1,2
8,6122015/01/20 2011035  ET WEB_SERVER SQL Injection BULK INSERT in URI to Insert File Content into Database Table; [1,2,3,4
< 361  362  363  364  365  366  367  368  369  370 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.