시그니처 리스트, Signature List
번호날짜ID시그니처 (Total Ruleset: 27,111개)
9,7112015/01/20 2012364  ET WEB_SPECIFIC_APPS Bexfront sid Parameter SELECT FROM SQL Injection Attempt; [1
9,7102015/01/20 2012363  ET WEB_SPECIFIC_APPS T-Content Management System id_novedad Parameter UPDATE SET SQL Injection Attempt; [1
9,7092015/01/20 2012362  ET WEB_SPECIFIC_APPS T-Content Management System id_novedad Parameter INSERT INTO SQL Injection Attempt; [1
9,7082015/01/20 2012361  ET WEB_SPECIFIC_APPS T-Content Management System id_novedad Parameter UNION SELECT SQL Injection Attempt; [1
9,7072015/01/20 2012360  ET WEB_SPECIFIC_APPS T-Content Management System id_novedad Parameter DELETE FROM SQL Injection Attempt; [1
9,7062015/01/20 2012359  ET WEB_SPECIFIC_APPS T-Content Management System id_novedad Parameter SELECT FROM SQL Injection Attempt; [1
9,7052015/01/20 2012358  ET WEB_SPECIFIC_APPS PHPCMS modelid Parameter SQL Injection Attempt;  
9,7042015/01/20 2012357  ET WEB_SPECIFIC_APPS Joomla XGallery com_xgallery Component Local File Inclusion Attempt; [1
9,7032015/01/20 2012356  ET WEB_SPECIFIC_APPS WordPress Featured Content param Parameter Cross Site Scripting Attempt; [1
9,7022015/01/20 2012355  ET WEB_SPECIFIC_APPS Moodle PHPCOVERAGE_HOME Parameter Cross Site Scripting Attempt; [1
9,7012015/01/20 2012354  ET WEB_SPECIFIC_APPS Dokeos and Chamilo open_document.php file Parameter File Disclosure Attempt;  
9,7002015/01/20 2012353  ET WEB_SPECIFIC_APPS WordPress Audio showfile Parameter Cross Site Scripting Attempt; [1
9,6992015/01/20 2012352  ET WEB_SPECIFIC_APPS PHP Classified ads software cid parameter Blind SQL Injection Attempt; [1
9,6982015/01/20 2012351  ET WEB_SPECIFIC_APPS Emerson Network AllResults.aspx Cross Site Scripting Attempt; [1
9,6972015/01/20 2012350  ET WEB_SPECIFIC_APPS PMB Services id Parameter UPDATE SET SQL Injection Attempt; [1
9,6962015/01/20 2012349  ET WEB_SPECIFIC_APPS PMB Services id Parameter INSERT INTO SQL Injection Attempt; [1
9,6952015/01/20 2012348  ET WEB_SPECIFIC_APPS Services id Parameter UNION SELECT SQL Injection Attempt; [1
9,6942015/01/20 2012347  ET WEB_SPECIFIC_APPS PMB Services id Parameter DELETE FROM SQL Injection Attempt; [1
9,6932015/01/20 2012346  ET WEB_SPECIFIC_APPS PMB Services id Parameter SELECT FROM SQL Injection Attempt; [1
9,6922015/01/20 2012345  ET WEB_SPECIFIC_APPS Joomla Frontend-User-Access controller Parameter Local File Inclusion Attempt; [1,2
9,6912015/01/20 2012344  ET WEB_SPECIFIC_APPS Madirish Webmail basedir Parameter Remote File inclusion Attempt; [1
9,6902015/01/20 2012343  ET WEB_SPECIFIC_APPS WeBid active_auctions.php lan Parameter Local File inclusion Attempt; [1
9,6892015/01/20 2012342  ET WEB_SPECIFIC_APPS PHP-fusion Team Structure Infusion team_id Parameter UPDATE SET SQL Injection Attempt; [1
9,6882015/01/20 2012341  ET WEB_SPECIFIC_APPS PHP-fusion Team Structure Infusion team_id Parameter INSERT INTO SQL Injection Attempt; [1
9,6872015/01/20 2012340  ET WEB_SPECIFIC_APPS PHP-fusion Team Structure Infusion team_id Parameter UNION SELECT SQL Injection Attempt; [1
9,6862015/01/20 2012339  ET WEB_SPECIFIC_APPS PHP-fusion Team Structure Infusion team_id Parameter DELETE FROM SQL Injection Attempt; [1
9,6852015/01/20 2012338  ET WEB_SPECIFIC_APPS PHP-fusion Team Structure Infusion team_id Parameter SELECT FROM SQL Injection Attempt; [1
9,6842015/01/20 2012337  ET WEB_SPECIFIC_APPS CultBooking lang Parameter Cross Site Scripting Attempt; [1
9,6832015/01/20 2012336  ET WEB_SPECIFIC_APPS CultBooking lang parameter Local File Inclusion Attempt; [1
9,6822015/01/20 2012335  ET WEB_SPECIFIC_APPS Coupon Script bus parameter Blind SQL Injection Attempt; [1
9,6812015/01/20 2012334  ET WEB_SPECIFIC_APPS Froxlor customer_ftp.php id Parameter Remote File Inclusion Attempt; [1
9,6802015/01/20 2012333  ET CURRENT_EVENTS Possible Neosploit Toolkit download; [1,2
9,6792015/01/20 2012332  ET DELETED Possible Fast Flux Trojan Rogue Antivirus; [1
9,6782015/01/20 2012331  ET POLICY Apple iDisk Sync Unencrypted;  
9,6772015/01/20 2012330  ET DELETED HTTP Request to a *.rr.nu domain;  
9,6762015/01/20 2012329  ET TROJAN IRS Inbound SPAM variant 3;  
9,6752015/01/20 2012328  ET MALWARE All Numerical .ru Domain Lookup Likely Malware Related;  
9,6742015/01/20 2012327  ET MALWARE All Numerical .cn Domain Likely Malware Related;  
9,6732015/01/20 2012326  ET WEB_CLIENT Obfuscated Javascript // ptth (escaped);  
9,6722015/01/20 2012325  ET WEB_CLIENT Obfuscated Javascript // ptth;  
9,6712015/01/20 2012324  ET EXPLOIT Unknown Exploit Pack URL Detected;  
9,6702015/01/20 2012323  ET DELETED Malicious Advertizing URL in.cgi/antibot_hash;  
9,6692015/01/20 2012322  ET TROJAN Possible TDSS User-Agent CMD; [1,2
9,6682015/01/20 2012321  ET POLICY HTTP Request to a *.cx.cc domain;  
9,6672015/01/20 2012320  ET TROJAN IRS Inbound SPAM;  
9,6662015/01/20 2012319  ET TROJAN IRS Inbound SMTP Malware;  
9,6652015/01/20 2012318  ET TROJAN FAKEAV download (AntiSpyWareSetup.exe);  
9,6642015/01/20 2012317  ET NETBIOS Microsoft Windows Server 2003 Active Directory Pre-Auth BROWSER ELECTION Heap Overflow Attempt; [1
9,6632015/01/20 2012316  ET DELETED Suspicious Win32 User Agent;  
9,6622015/01/20 2012315  ET USER_AGENTS Fake Opera 8.11 UA related to Trojan Activity;  
< 341  342  343  344  345  346  347  348  349  350 >
GigaVPN & GigaIPS is based MikroTik, Suricata and EmergingThreats.
Copyright ⓒ 2010 . All Rights Reserved.