시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,7612015/01/20 2012414  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id INSERT; [1,2
9,7602015/01/20 2012413  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id UNION SELECT; [1,2
9,7592015/01/20 2012412  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress SQL Injection Attempt updateAJAX.php post_id SELECT; [1,2
9,7582015/01/20 2012411  ET WEB_SPECIFIC_APPS IWantOneButton Wordpress updateAJAX.php post_id Parameter Cross Site Scripting Attempt; [1,2
9,7572015/01/20 2012410  ET DELETED DroidDream Android Trojan info upload; [1,2,3,4
9,7562015/01/20 2012409  ET DELETED Unknown Malware Keepalive;  
9,7552015/01/20 2012408  ET WEB_SPECIFIC_APPS Potential Wordpress local file disclosure vulnerability; [1
9,7542015/01/20 2012407  ET WEB_SPECIFIC_APPS Potential Wordpress local file disclosure vulnerability; [1
9,7532015/01/20 2012406  ET WEB_SPECIFIC_APPS Potential Cewolf DOS attempt; [1
9,7522015/01/20 2012405  ET TROJAN Potential FakePAV Checkin; [1
9,7512015/01/20 2012404  ET WEB_CLIENT Likely Hostile Eval CRYPT.obfuscate Usage; [1
9,7502015/01/20 2012403  ET DELETED Potential Rogue Antivirus FakePAV; [1
9,7492015/01/20 2012402  ET DELETED Facebook URL Redirect Vulnerability; [1
9,7482015/01/20 2012401  ET CURRENT_EVENTS Likely Blackhole Exploit Kit Driveby Download Secondary Request;  
9,7472015/01/20 2012400  ET WEB_CLIENT Hex Obfuscation of replace Javascript Function %u UTF-16 Encoding; [1,2
9,7462015/01/20 2012399  ET WEB_CLIENT Hex Obfuscation of replace Javascript Function %u UTF-8 Encoding; [1,2
9,7452015/01/20 2012398  ET WEB_CLIENT Hex Obfuscation of replace Javascript Function % Encoding; [1,2
9,7442015/01/20 2012397  ET WEB_SPECIFIC_APPS Eclipse IDE Help Component Cross Site Scripting Attempt;  
9,7432015/01/20 2012396  ET WEB_SPECIFIC_APPS Eclipse IDE Help Component Cross Site Scripting Attempt;  
9,7422015/01/20 2012395  ET WEB_SPECIFIC_APPS IBM Lotus Sametime Server stconf.nsf Cross Site Scripting Attempt;  
9,7412015/01/20 2012394  ET WEB_SPECIFIC_APPS IBM Lotus Sametime Server stconf.nsf Cross Site Scripting Attempt;  
9,7402015/01/20 2012393  ET WEB_SPECIFIC_APPS Awstats Apache Tomcat Configuration File Remote Arbitrary Command Execution Attempt;  
9,7392015/01/20 2012392  ET TROJAN Suspicious Download Setup_ exe; [1
9,7382015/01/20 2012391  ET TROJAN Tatanga Checkin; [1,2,3,4
9,7372015/01/20 2012390  ET P2P Libtorrent User-Agent;  
9,7362015/01/20 2012389  ET TROJAN Java Exploit Kit Success Check-in Executable Download Likely;  
9,7352015/01/20 2012388  ET TROJAN USPS SPAM Inbound possible spyeye trojan; [1
9,7342015/01/20 2012387  ET USER_AGENTS Suspicious User-Agent PrivacyInfoUpdate;  
9,7332015/01/20 2012386  ET USER_AGENTS Suspicious User-Agent VCTestClient;  
9,7322015/01/20 2012385  ET DELETED Likely Infected HTTP POST to PHP with User-Agent of HTTP Client;  
9,7312015/01/20 2012384  ET INFO Suspicious Purported MSIE 7 with terse HTTP Headers GET to PHP;  
9,7302015/01/20 2012383  ET WEB_SPECIFIC_APPS Coppermine Photo Gallery retva Parameter Remote Command Execution Attempt; [1
9,7292015/01/20 2012382  ET WEB_SPECIFIC_APPS Coppermine Photo Gallery output Parameter Remote Command Execution Attempt; [1
9,7282015/01/20 2012381  ET WEB_SPECIFIC_APPS ITechBids productid Parameter Blind SQL Injection Attempt; [1
9,7272015/01/20 2012380  ET WEB_SPECIFIC_APPS Podcast Generator themes.php Cross Site Scripting Attempt; [1
9,7262015/01/20 2012379  ET WEB_SPECIFIC_APPS TelebidAuctionScript aid Parameter Blind SQL Injection Attempt; [1
9,7252015/01/20 2012378  ET WEB_SPECIFIC_APPS Woltlab Burning Board katid Parameter UPDATE SET SQL Injection Attempt; [1
9,7242015/01/20 2012377  ET WEB_SPECIFIC_APPS Woltlab Burning Board katid Parameter INSERT INTO SQL Injection Attempt; [1
9,7232015/01/20 2012376  ET WEB_SPECIFIC_APPS Woltlab Burning Board katid Parameter UNION SELECT SQL Injection Attempt; [1
9,7222015/01/20 2012375  ET WEB_SPECIFIC_APPS Woltlab Burning Board katid Parameter DELETE FROM SQL Injection Attempt; [1
9,7212015/01/20 2012374  ET WEB_SPECIFIC_APPS Woltlab Burning Board katid Parameter SELECT FROM SQL Injection Attempt; [1
9,7202015/01/20 2012373  ET WEB_SPECIFIC_APPS Horde type Parameter Local File Inclusion Attempt; [1
9,7192015/01/20 2012372  ET WEB_SPECIFIC_APPS ColdUserGroup LibraryID Parameter Blind SQL Injection Attempt; [1
9,7182015/01/20 2012371  ET WEB_SPECIFIC_APPS Boonex Dolphin relocate Parameter Cross Site Scripting Attempt; [1
9,7172015/01/20 2012370  ET WEB_SPECIFIC_APPS Boonex Dolphin explain Parameter Cross Site Scripting Attempt; [1
9,7162015/01/20 2012369  ET WEB_SPECIFIC_APPS Joomla swMenuPro ImageManager.php Remote File Inclusion Attempt; [1
9,7152015/01/20 2012368  ET WEB_SPECIFIC_APPS Bexfront sid Parameter UPDATE SET SQL Injection Attempt; [1
9,7142015/01/20 2012367  ET WEB_SPECIFIC_APPS Bexfront sid Parameter INSERT INTO SQL Injection Attempt; [1
9,7132015/01/20 2012366  ET WEB_SPECIFIC_APPS Bexfront sid Parameter UNION SELECT SQL Injection Attempt; [1
9,7122015/01/20 2012365  ET WEB_SPECIFIC_APPS Bexfront sid Parameter DELETE FROM SQL Injection Attempt; [1
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.