번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 7,411 | 2015/01/20 | 2009705 | ET MALWARE W3i Related Adware/Spyware; [1,2] | 7,410 | 2015/01/20 | 2009704 | ET TROJAN Win32.Hupigon.dkwt Related Checkin; [1] | 7,409 | 2015/01/20 | 2009703 | ET TROJAN Suspicious User-Agent (INet); [1] | 7,408 | 2015/01/20 | 2009702 | ET POLICY DNS Update From External net; [1] | 7,407 | 2015/01/20 | 2009701 | ET DOS DNS BIND 9 Dynamic Update DoS attempt; [1] | 7,406 | 2015/01/20 | 2009700 | ET VOIP Multiple Unauthorized SIP Responses UDP; [1] | 7,405 | 2015/01/20 | 2009699 | ET VOIP REGISTER Message Flood UDP; [1] | 7,404 | 2015/01/20 | 2009698 | ET VOIP INVITE Message Flood UDP; [1] | 7,403 | 2015/01/20 | 2009697 | ET POLICY External Connection to Altiris Console; [1,2] | 7,402 | 2015/01/20 | 2009696 | ET POLICY External Connection to Altiris HelpDesk; [1,2] | 7,401 | 2015/01/20 | 2009694 | ET TROJAN Navipromo related update; [1] | 7,400 | 2015/01/20 | 2009693 | ET WEB_SPECIFIC_APPS Zen Cart Remote Code Execution; [1,2,3] | 7,399 | 2015/01/20 | 2009691 | ET WEB_SPECIFIC_APPS WebMoney html2.php page Remote File Inclusion; [1,2] | 7,398 | 2015/01/20 | 2009690 | ET WEB_SPECIFIC_APPS WebMoney html.php page Remote File Inclusion; [1,2] | 7,397 | 2015/01/20 | 2009689 | ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 3; [1,2] | 7,396 | 2015/01/20 | 2009688 | ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 2; [1,2] | 7,395 | 2015/01/20 | 2009687 | ET ACTIVEX Akamai Download Manager Stack Buffer Overflow CLSID Access 1; [1,2] | 7,394 | 2015/01/20 | 2009685 | ET TROJAN Unkown Trojan User-Agent (5.1 ...); [1] | 7,393 | 2015/01/20 | 2009684 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 6; [1,2,3] | 7,392 | 2015/01/20 | 2009683 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 5; [1,2,3] | 7,391 | 2015/01/20 | 2009682 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 4; [1,2,3] | 7,390 | 2015/01/20 | 2009681 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 3; [1,2,3] | 7,389 | 2015/01/20 | 2009680 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 2; [1,2,3] | 7,388 | 2015/01/20 | 2009679 | ET DELETED Phorum Possible Javascript/Remote-File-Inclusion 1; [1,2,3] | 7,387 | 2015/01/20 | 2009678 | ET WEB_SERVER Possible DD-WRT Metacharacter Injection Command Execution Attempt; [1,2,3,4] | 7,386 | 2015/01/20 | 2009677 | ET WEB_SERVER Possible BASE Authentication Bypass Attempt; [1,2,3] | 7,385 | 2015/01/20 | 2009676 | ET ATTACK_RESPONSE Ipconfig Response Detected; [1,2] | 7,384 | 2015/01/20 | 2009675 | ET ATTACK_RESPONSE Possible Ipconfig Information Detected in HTTP Response; [1,2] | 7,383 | 2015/01/20 | 2009674 | ET WEB_SPECIFIC_APPS Guestbook guestbook.php mes_id SQL Injection attempt; [1,2] | 7,382 | 2015/01/20 | 2009673 | ET WEB_SPECIFIC_APPS programsrating postcomments.php id XSS attempt; [1,2] | 7,381 | 2015/01/20 | 2009672 | ET WEB_SPECIFIC_APPS programsrating rate.php id XSS attempt; [1,2] | 7,380 | 2015/01/20 | 2009671 | ET WEB_SPECIFIC_APPS millionpixel payment.php order_id XSS attempt; [1,2] | 7,379 | 2015/01/20 | 2009670 | ET WEB_SERVER Nagios statuswml.cgi Remote Arbitrary Shell Command Injection attempt; [1] | 7,378 | 2015/01/20 | 2009668 | ET POLICY FTP Frequent Admin Login Attempts; [1] | 7,377 | 2015/01/20 | 2009667 | ET POLICY FTP Frequent Administrator Login Attempts; [1] | 7,376 | 2015/01/20 | 2009665 | ET DELETED Possible JAVA pack200-zip-exploit attempt; [1,2] | 7,375 | 2015/01/20 | 2009663 | ET WEB_SPECIFIC_APPS TotalCalendar config.php inc_dir Parameter Remote File Inclusion; [1,2] | 7,374 | 2015/01/20 | 2009661 | ET WEB_SPECIFIC_APPS artmedic weblog artmedic_print.php date Parameter Local File Inclusion; [1,2,3] | 7,373 | 2015/01/20 | 2009660 | ET WEB_SPECIFIC_APPS PowerPHPBoard header.inc.php settings Parameter Local File Inclusion; [1,2,3] | 7,372 | 2015/01/20 | 2009659 | ET WEB_SPECIFIC_APPS PowerPHPBoard footer.inc.php settings Parameter Local File Inclusion; [1,2,3] | 7,371 | 2015/01/20 | 2009658 | ET WEB_SPECIFIC_APPS Kalptaru Infotech Automated Link Exchange Portal cat_id Parameter SQL Injection; [1,2] | 7,370 | 2015/01/20 | 2009657 | ET ACTIVEX BaoFeng Storm ActiveX Control SetAttributeValue Method Buffer Overflow; [1,2,3,4] | 7,369 | 2015/01/20 | 2009656 | ET WEB_SPECIFIC_APPS SMA-DB format.php _page_content Parameter Remote File Inclusion; [1,2] | 7,368 | 2015/01/20 | 2009654 | ET WEB_SPECIFIC_APPS SMA-DB format.php _page_javascript Parameter Remote File Inclusion; [1,2] | 7,367 | 2015/01/20 | 2009653 | ET WEB_SPECIFIC_APPS SMA-DB format.php _page_css Parameter Remote File Inclusion; [1,2] | 7,366 | 2015/01/20 | 2009652 | ET WEB_SPECIFIC_APPS FreeWebShop startmodules.inc.php lang_file Parameter Local File Inclusion; [1,2] | 7,365 | 2015/01/20 | 2009651 | ET ATTACK_RESPONSE Metasploit Meterpreter Channel Interaction Detected, Likely Interaction With Executable; [1,2] | 7,364 | 2015/01/20 | 2009650 | ET WEB_SPECIFIC_APPS Hubscript PHPInfo Attempt; [1,2] | 7,363 | 2015/01/20 | 2009647 | ET WEB_SPECIFIC_APPS Hubscript XSS Attempt; [1,2] | 7,362 | 2015/01/20 | 2009646 | ET SCAN Acunetix Version 6 (Free Edition) Scan Detected; [1,2] | < 391 392 393 394 395 396 397 398 399 400 > |
|