시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
10,0112015/01/20 2012674  ET WEB_SPECIFIC_APPS Andy PHP Knowledgebase SQL Injection Attempt pdfgen.php pdfa INSERT; [1,2
10,0102015/01/20 2012673  ET WEB_SPECIFIC_APPS Andy PHP Knowledgebase SQL Injection Attempt pdfgen.php pdfa UNION SELECT; [1,2
10,0092015/01/20 2012672  ET WEB_SPECIFIC_APPS Andy PHP Knowledgebase SQL Injection Attempt pdfgen.php pdfa SELECT; [1,2
10,0082015/01/20 2012670  ET WEB_SPECIFIC_APPS PhotoSmash action Parameter Cross Site Scripting Attempt; [1
10,0072015/01/20 2012669  ET WEB_SPECIFIC_APPS ClanSphere 'CKEditorFuncNum' parameter Cross Site Scripting Attempt; [1
10,0062015/01/20 2012668  ET WEB_SPECIFIC_APPS LoCal Calendar System LIBDIR Parameter Local File Inclusion Attempt; [1
10,0052015/01/20 2012667  ET WEB_SPECIFIC_APPS Joomla Component Media Mall Factory Blind SQL Injection Attempt; [1
10,0042015/01/20 2012666  ET WEB_SPECIFIC_APPS Joomla component smartformer Remote File Inclusion Attempt; [1
10,0032015/01/20 2012665  ET WEB_SPECIFIC_APPS vBulletin cChatBox messageid Parameter UPDATE SET SQL Injection Attempt;  
10,0022015/01/20 2012664  ET WEB_SPECIFIC_APPS vBulletin cChatBox messageid Parameter INSERT INTO SQL Injection Attempt;  
10,0012015/01/20 2012663  ET WEB_SPECIFIC_APPS vBulletin cChatBox messageid Parameter UNION SELECT SQL Injection Attempt;  
10,0002015/01/20 2012662  ET WEB_SPECIFIC_APPS vBulletin cChatBox messageid Parameter DELETE FROM SQL Injection Attempt;  
9,9992015/01/20 2012661  ET WEB_SPECIFIC_APPS vBulletin cChatBox messageid Parameter SELECT FROM SQL Injection Attempt;  
9,9982015/01/20 2012660  ET WEB_SPECIFIC_APPS Portel patron Parameter Blind SQL Injection Attempt; [1
9,9972015/01/20 2012659  ET WEB_SPECIFIC_APPS Joomla Component com_doqment Remote File inclusion Attempt; [1
9,9962015/01/20 2012658  ET WEB_SPECIFIC_APPS OrangeHRM recruitcode parameter Cross Site Script Attempt;  
9,9952015/01/20 2012657  ET WEB_SPECIFIC_APPS eyeOS file Parameter Local File Inclusion Attempt; [1
9,9942015/01/20 2012656  ET WEB_SPECIFIC_APPS eyeOS callback parameter Cross Site Scripting Attempt; [1
9,9932015/01/20 2012655  ET WEB_SPECIFIC_APPS PHP-Nuke Surveys pollID parameter UPDATE SET SQL Injection Attempt; [1
9,9922015/01/20 2012654  ET WEB_SPECIFIC_APPS PHP-Nuke Surveys pollID parameter INSERT INTO SQL Injection Attempt; [1
9,9912015/01/20 2012653  ET WEB_SPECIFIC_APPS PHP-Nuke Surveys pollID parameter UNION SELECT SQL Injection Attempt; [1
9,9902015/01/20 2012652  ET WEB_SPECIFIC_APPS PHP-Nuke Surveys pollID parameter DELETE FROM SQL Injection Attempt; [1
9,9892015/01/20 2012651  ET WEB_SPECIFIC_APPS PHP-Nuke Surveys pollID parameter SELECT FROM SQL Injection Attempt; [1
9,9882015/01/20 2012650  ET TROJAN HTTP Request to a Malware Related Numerical .cn Domain;  
9,9872015/01/20 2012649  ET MALWARE All Numerical .ru Domain HTTP Request Likely Malware Related;  
9,9862015/01/20 2012648  ET POLICY Dropbox Client Broadcasting;  
9,9852015/01/20 2012647  ET POLICY Dropbox.com Offsite File Backup in Use; [1,2
9,9842015/01/20 2012646  ET CURRENT_EVENTS Malicious JAR olig;  
9,9832015/01/20 2012645  ET TROJAN GET to Google with specific HTTP lib likely Cycbot/Bifrose/Kryptic checking Internet connection;  
9,9822015/01/20 2012644  ET CURRENT_EVENTS Java Exploit Attempt Request for hostile binary;  
9,9812015/01/20 2012643  ET DELETED Trojan-Clicker.Win32.Agent.qqf Checkin; [1
9,9802015/01/20 2012642  ET MALWARE Lowercase mozilla/2.0 User-Agent Likely Malware; [1
9,9792015/01/20 2012641  ET ACTIVEX Sun Java Runtime New Plugin Docbase Buffer Overflow Attempt;  
9,9782015/01/20 2012640  ET ACTIVEX RealNetworks RealGames StubbyUtil.ShellCtl.1 InstallerDlg.dll Remote Command Execution Attempt; [1
9,9772015/01/20 2012639  ET ACTIVEX RealNetworks RealGames StubbyUtil.ShellCtl.1 InstallerDlg.dll Remote Command Execution Attempt; [1
9,9762015/01/20 2012638  ET ACTIVEX RealNetworks RealGames StubbyUtil.ShellCtl.1 InstallerDlg.dll Remote Command Execution Attempt; [1
9,9752015/01/20 2012637  ET ACTIVEX RealNetworks RealGames StubbyUtil.ProcessMgr.1 InstallerDlg.dll Remote Command Execution Attempt; [1
9,9742015/01/20 2012636  ET ACTIVEX RealNetworks RealGames StubbyUtil.ProcessMgr.1 InstallerDlg.dll Remote Command Execution Attempt; [1
9,9732015/01/20 2012635  ET CURRENT_EVENTS Potential ACH Transaction Phishing Attachment;  
9,9722015/01/20 2012634  ET DELETED Content-Type image/jpeg with Win32 MZ header set likely 2nd stage download;  
9,9712015/01/20 2012633  ET DELETED Content-Type image/jpeg with DOS MZ header set likely 2nd stage download;  
9,9702015/01/20 2012632  ET CURRENT_EVENTS Potential Paypal Phishing Form Attachment;  
9,9692015/01/20 2012631  ET TROJAN Chinese Bootkit Checkin; [1
9,9682015/01/20 2012630  ET CURRENT_EVENTS Paypal Phishing victim POSTing data;  
9,9672015/01/20 2012629  ET USER_AGENTS Optimum Installer User-Agent IE6 on Windows XP;  
9,9662015/01/20 2012628  ET CURRENT_EVENTS Java Exploit Attempt Request for .id from octal host; [1
9,9652015/01/20 2012627  ET TROJAN FakeAV Check-in purporting to be MSIE with invalid terse HTTP headers;  
9,9642015/01/20 2012626  ET DELETED Unknown Dropper Checkin with NSISDL/1.2 User-Agent;  
9,9632015/01/20 2012625  ET CURRENT_EVENTS Potential Lizamoon Client Request /ur.php;  
9,9622015/01/20 2012624  ET CURRENT_EVENTS Lizamoon Related Compromised site served to local client;  
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.