번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) | 8,361 | 2015/01/20 | 2010763 | ET WEB_SPECIFIC_APPS Possible Zenoss Cross Site Request Forgery Ping UserCommand Attempt; [1,2] | 8,360 | 2015/01/20 | 2010762 | ET WEB_SPECIFIC_APPS Possible Zenoss Cross Site Request Forgery UserCommand Attempt; [1,2] | 8,359 | 2015/01/20 | 2010761 | ET WEB_SPECIFIC_APPS Possible Zenoss Cross Site Request Forgery Attempt; [1,2] | 8,358 | 2015/01/20 | 2010760 | ET ACTIVEX Possible Gracenote CDDBControl ActiveX Control ViewProfile Method Heap Buffer Overflow Attempt; [1,2] | 8,357 | 2015/01/20 | 2010759 | ET EXPLOIT Xerox WorkCentre PJL Daemon Buffer Overflow Attempt; [1,2] | 8,356 | 2015/01/20 | 2010758 | ET WEB_CLIENT VLC Media Player .ass File Buffer Overflow Attempt; [1,2] | 8,355 | 2015/01/20 | 2010757 | ET WEB_CLIENT VLC Media Player Aegisub Advanced SubStation (.ass) File Request flowbit set; [1] | 8,354 | 2015/01/20 | 2010756 | ET TROJAN Sasfis Botnet Client Reporting Back to Controller After Command Execution; [1,2] | 8,353 | 2015/01/20 | 2010755 | ET DOS IBM DB2 kuddb2 Remote Denial of Service Attempt; [1,2,3] | 8,352 | 2015/01/20 | 2010754 | ET WEB_SPECIFIC_APPS Joomla com_musicgallery Component Id Parameter UPDATE SET SQL Injection Attempt; [1,2] | 8,351 | 2015/01/20 | 2010753 | ET WEB_SPECIFIC_APPS Joomla com_musicgallery Component Id Parameter INSERT INTO SQL Injection Attempt; [1,2] | 8,350 | 2015/01/20 | 2010752 | ET WEB_SPECIFIC_APPS Joomla com_musicgallery Component Id Parameter UNION SELECT SQL Injection Attempt; [1,2] | 8,349 | 2015/01/20 | 2010751 | ET WEB_SPECIFIC_APPS Joomla com_musicgallery Component Id Parameter DELETE FROM SQL Injection Attempt; [1,2] | 8,348 | 2015/01/20 | 2010750 | ET WEB_SPECIFIC_APPS Joomla com_musicgallery Component Id Parameter SELECT FROM SQL Injection Attempt; [1,2] | 8,347 | 2015/01/20 | 2010749 | ET ACTIVEX SoftArtisans XFile FileManager ActiveX DeleteFile method stack overflow Attempt; [1,2,3,4] | 8,346 | 2015/01/20 | 2010748 | ET ACTIVEX SoftArtisans XFile FileManager ActiveX DriveExists method stack overflow Attempt; [1,2,3,4] | 8,345 | 2015/01/20 | 2010747 | ET ACTIVEX SoftArtisans XFile FileManager ActiveX GetDriveName method stack overflow Attempt; [1,2,3,4] | 8,344 | 2015/01/20 | 2010746 | ET ACTIVEX SoftArtisans XFile FileManager ActiveX Buildpath method stack overflow Attempt; [1,2,3,4] | 8,343 | 2015/01/20 | 2010745 | ET ACTIVEX SoftArtisans XFile FileManager ActiveX stack overfow Function call Attempt; [1,2,3,4] | 8,342 | 2015/01/20 | 2010744 | ET TROJAN Oficla Russian Malware Bundle C&C instruction response (2); [1,2] | 8,341 | 2015/01/20 | 2010743 | ET TROJAN Oficla Checkin (1); [1,2] | 8,340 | 2015/01/20 | 2010742 | ET DELETED Pinkslipbot Trojan Downloader; [1] | 8,339 | 2015/01/20 | 2010741 | ET TROJAN Suspicious exe.exe request - possible downloader/Oficla; [1,2] | 8,338 | 2015/01/20 | 2010740 | ET FTP FTP STOR command attempt without login; [1,2] | 8,337 | 2015/01/20 | 2010739 | ET FTP FTP RNFR command attempt without login; [1,2] | 8,336 | 2015/01/20 | 2010738 | ET FTP FTP RNTO command attempt without login; [1,2] | 8,335 | 2015/01/20 | 2010737 | ET FTP FTP NLST command attempt without login; [1,2] | 8,334 | 2015/01/20 | 2010736 | ET FTP FTP RETR command attempt without login; [1,2] | 8,333 | 2015/01/20 | 2010735 | ET FTP FTP PWD command attempt without login; [1,2] | 8,332 | 2015/01/20 | 2010734 | ET FTP FTP MKDIR command attempt without login; [1,2] | 8,331 | 2015/01/20 | 2010733 | ET FTP FTP RMDIR command attempt without login; [1,2] | 8,330 | 2015/01/20 | 2010732 | ET FTP FTP SITE command attempt without login; [1,2] | 8,329 | 2015/01/20 | 2010731 | ET FTP FTP CWD command attempt without login; [1,2] | 8,328 | 2015/01/20 | 2010730 | ET WEB_SERVER Possible Cisco ASA Appliance Clientless SSL VPN HTML Rewriting Security Bypass Attempt/Cross Site Scripting Attempt; [1,2,3,4] | 8,327 | 2015/01/20 | 2010729 | ET DELETED Zeus Bot / Zbot Checkin (/us01d/in.php); [1,2] | 8,326 | 2015/01/20 | 2010728 | ET WEB_SPECIFIC_APPS WordPress wp-admin/admin.php Module Configuration Security Bypass Attempt; [1,2] | 8,325 | 2015/01/20 | 2010727 | ET MALWARE User-Agent (Live Enterprise Suite); [1] | 8,324 | 2015/01/20 | 2010726 | ET ACTIVEX Adobe browser document ActiveX DoS Attempt; [1,2] | 8,323 | 2015/01/20 | 2010725 | ET POLICY ApacheBenchmark Tool User-Agent Detected; [1,2] | 8,322 | 2015/01/20 | 2010724 | ET TROJAN Oficla Russian Malware Bundle C&C instruction response; [1,2] | 8,321 | 2015/01/20 | 2010723 | ET TROJAN Oficla Russian Malware Bundle C&C instruction response with runurl; [1,2] | 8,320 | 2015/01/20 | 2010722 | ET USER_AGENTS Suspicious Non-Escaping backslash in User-Agent Inbound; [1,2,3] | 8,319 | 2015/01/20 | 2010721 | ET USER_AGENTS Suspicious Non-Escaping backslash in User-Agent Outbound; [1,2] | 8,318 | 2015/01/20 | 2010720 | ET WEB_SERVER PHP Scan Precursor; [1] | 8,317 | 2015/01/20 | 2010719 | ET WEB_SPECIFIC_APPS e107 CMS backdoor access, admin-access cookie and HTTP POST; [1,2,3] | 8,316 | 2015/01/20 | 2010718 | ET TROJAN Gootkit Checkin User-Agent (Gootkit HTTP Client); [1] | 8,315 | 2015/01/20 | 2010717 | ET MALWARE Suspicious User-Agent (FaceCooker); [1] | 8,314 | 2015/01/20 | 2010716 | ET DELETED Malwareurl - wywg executable download Likely Malware; [1,2] | 8,313 | 2015/01/20 | 2010715 | ET SCAN ZmEu exploit scanner; [1] | 8,312 | 2015/01/20 | 2010714 | ET WEB_SPECIFIC_APPS Joomla Foobla Suggestions Component idea_id UPDATE SET SQL Injection Attempt; [1] | < 371 372 373 374 375 376 377 378 379 380 > |
|