| 번호 | 날짜 | ID | 시그니처 (Total Ruleset: 27,111개) |
| 13,311 | 2015/01/20 | 2016164 | ET WEB_SPECIFIC_APPS SiteGo get_templet.php of blue Remote File Inclusion Attempt; [1] |
| 13,310 | 2015/01/20 | 2016163 | ET WEB_SPECIFIC_APPS SiteGo get_templet.php of green Remote File Inclusion Attempt; [1] |
| 13,309 | 2015/01/20 | 2016162 | ET ACTIVEX Possible Sony PC Companion Admin_RemoveDirectory Stack-based Unicode Buffer Overload SEH; [1] |
| 13,308 | 2015/01/20 | 2016161 | ET ACTIVEX Possible Sony PC Companion CheckCompatibility method Stack-based Unicode Buffer Overload; [1] |
| 13,307 | 2015/01/20 | 2016160 | ET ACTIVEX Possible Sony PC Companion Load method Stack-based Unicode Buffer Overload SEH; [1] |
| 13,306 | 2015/01/20 | 2016159 | ET WEB_SPECIFIC_APPS Simple Machines Forum ssi_function parameter path disclosure vulnerability; [1] |
| 13,305 | 2015/01/20 | 2016158 | ET WEB_SPECIFIC_APPS Wordpress Google Doc Embedder plugin file parameter Local File Inclusion Attempt; [1] |
| 13,304 | 2015/01/20 | 2016157 | ET WEB_SPECIFIC_APPS WHM filtername Parameter Cross Site Scripting Attempt; [1] |
| 13,303 | 2015/01/20 | 2016156 | ET WEB_SPECIFIC_APPS Mahara query Parameter Cross Site Scripting Attempt; [1] |
| 13,302 | 2015/01/20 | 2016155 | ET CURRENT_EVENTS Magnitude EK (formerly Popads) - Font Exploit - 32HexChar.eot; |
| 13,301 | 2015/01/20 | 2016154 | ET CURRENT_EVENTS Possible TURKTRUST Spoofed Google Cert; |
| 13,300 | 2015/01/20 | 2016153 | ET WEB_SERVER WebShell - JSP File Admin - POST Structure - dir; |
| 13,299 | 2015/01/20 | 2016152 | ET WEB_SERVER WebShell - JSP File Admin; |
| 13,298 | 2015/01/20 | 2016151 | ET WEB_SERVER WebShell - JSP RAT; |
| 13,297 | 2015/01/20 | 2016150 | ET INFO Session Traversal Utilities for NAT (STUN Binding Response); [1] |
| 13,296 | 2015/01/20 | 2016149 | ET INFO Session Traversal Utilities for NAT (STUN Binding Request); [1] |
| 13,295 | 2015/01/20 | 2016148 | ET WEB_SPECIFIC_APPS WordPress Plugin Advanced Custom Fields Remote File Inclusion; |
| 13,294 | 2015/01/20 | 2016147 | ET TROJAN Request for fake postal receipt from e-mail link; |
| 13,293 | 2015/01/20 | 2016146 | ET INFO PTUNNEL INBOUND; [1,2] |
| 13,292 | 2015/01/20 | 2016145 | ET INFO PTUNNEL OUTBOUND; [1,2] |
| 13,291 | 2015/01/20 | 2016144 | ET CURRENT_EVENTS Injected iframe leading to Redkit Jan 02 2013; |
| 13,290 | 2015/01/20 | 2016143 | ET DELETED Sweet Orange Java obfuscated binary (2); |
| 13,289 | 2015/01/20 | 2016142 | ET CURRENT_EVENTS Sweet Orange Java payload request (2); |
| 13,288 | 2015/01/20 | 2016141 | ET INFO Exectuable Download from dotted-quad Host; |
| 13,287 | 2015/01/20 | 2016140 | ET DELETED Suspicious User Agent (iexplorer); |
| 13,286 | 2015/01/20 | 2016139 | ET TROJAN TR/Spy.55808.201; |
| 13,285 | 2015/01/20 | 2016138 | ET CURRENT_EVENTS Possible Exodus Intel IE HTML TIME EIP Control Technique; [1] |
| 13,284 | 2015/01/20 | 2016137 | ET CURRENT_EVENTS CVE-2012-4792 EIP in URI (1); [1,2] |
| 13,283 | 2015/01/20 | 2016136 | ET CURRENT_EVENTS Metasploit CVE-2012-4792 EIP in URI IE 8; [1,2] |
| 13,282 | 2015/01/20 | 2016135 | ET CURRENT_EVENTS CFR DRIVEBY CVE-2012-4792 DNS Query for C2 domain; [1,2] |
| 13,281 | 2015/01/20 | 2016134 | ET CURRENT_EVENTS Escaped Unicode Char in Location CVE-2012-4792 EIP % Hex Encode; [1,2] |
| 13,280 | 2015/01/20 | 2016133 | ET CURRENT_EVENTS Escaped Unicode Char in Location CVE-2012-4792 EIP (Exploit Specific replace); [1,2] |
| 13,279 | 2015/01/20 | 2016132 | ET CURRENT_EVENTS Escaped Unicode Char in Window Location CVE-2012-4792 EIP; [1,2] |
| 13,278 | 2015/01/20 | 2016131 | ET DELETED Stabuniq Observed C&C POST Target /rss.php; [1,2,3] |
| 13,277 | 2015/01/20 | 2016130 | ET TROJAN Stabuniq Checkin; [1,2,3] |
| 13,276 | 2015/01/20 | 2016129 | ET CURRENT_EVENTS Unknown_gmf/Styx EK - fnts.html; |
| 13,275 | 2015/01/20 | 2016128 | ET CURRENT_EVENTS RedKit - Landing Page; |
| 13,274 | 2015/01/20 | 2016127 | ET TROJAN W32/Downloader.FakeFlashPlayer Kelimeid CnC Beacon; |
| 13,273 | 2015/01/20 | 2016126 | ET TROJAN W32/Downloader.FakeFlashPlayer Bitensiteler CnC Beacon; |
| 13,272 | 2015/01/20 | 2016125 | ET TROJAN W32/Downloader.FakeFlashPlayer Status.Php CnC Beacon; |
| 13,271 | 2015/01/20 | 2016124 | ET TROJAN W32/Downloader.FakeFlashPlayer Clientregister.php CnC Beacon; |
| 13,270 | 2015/01/20 | 2016123 | ET WEB_SPECIFIC_APPS Wordpress Myflash path parameter Local File Inclusion Attempt; [1] |
| 13,269 | 2015/01/20 | 2016122 | ET WEB_SPECIFIC_APPS LogAnalyzer asktheoracle.php file XSS Attempt; [1] |
| 13,268 | 2015/01/20 | 2016121 | ET WEB_SPECIFIC_APPS WordPress Relocate Upload plugin abspath parameter Remote File Inclusion Attempt; [1] |
| 13,267 | 2015/01/20 | 2016120 | ET WEB_SPECIFIC_APPS Wiki Web Help configpath parameter Remote File Inclusion Attempt; [1] |
| 13,266 | 2015/01/20 | 2016119 | ET WEB_SPECIFIC_APPS Symantec Messaging Gateway 9.5.3-3 - Arbitrary file download 2; [1] |
| 13,265 | 2015/01/20 | 2016118 | ET ACTIVEX Possible Advantech Studio ISSymbol ActiveX Control Multiple Buffer Overflow Attempt; [1] |
| 13,264 | 2015/01/20 | 2016117 | ET WEB_SPECIFIC_APPS WordPress Mailing List plugin wpabspath parameter Remote File Inclusion Attempt; [1] |
| 13,263 | 2015/01/20 | 2016116 | ET WEB_SPECIFIC_APPS gpEasy CMS key parameter XSS Attempt; [1] |
| 13,262 | 2015/01/20 | 2016115 | ET WEB_SPECIFIC_APPS gpEasy CMS index.php file XSS Attempt; [1] |
| < 271 272 273 274 275 276 277 278 279 280 > |