Business

search close
  • 솔루션
    • 과제별
      • 과제별
        • 과제별
          자세히 알아보기
      • 위험 이해, 우선순위 지정 및 위험 완화
        • 위험 이해, 우선순위 지정 및 위험 완화

          공격 표면 관리를 통한 위험 태세 개선

          자세히 알아보기
      • 클라우드 네이티브 앱 보호
        • 클라우드 네이티브 앱 보호

          비즈니스 성과를 실현해 주는 보안

          자세히 알아보기
      • 하이브리드 환경 보호
        • 하이브리드 및 멀티 클라우드 보호

          보안을 통해 가시성 확보 및 비즈니스 요구사항 충족

          자세히 알아보기
      • 전 세계 직원 보호
        • 전 세계 직원 보호

          어디서나 어떤 장치에서나 자신 있게 연결

          자세히 알아보기
      • 네트워크 사각지대 제거
        • 네트워크 사각지대 제거

          전체 환경에서 사용자와 핵심 운영 활동을 보호

          자세히 알아보기
      • 빠른 탐지와 정확한 대응.
        • 빠른 탐지와 정확한 대응.

          강력한 전용 XDR, 공격 표면 위험 관리 및 제로 트러스트 기능으로 공격자보다 더 빠르게 움직입니다.

          자세히 알아보기
      • Extend Your Team
        • 팀 역량 강화 위협에 민첩하게 대응

          선제적 위험 감소와 관리형 서비스로 효율성 극대화

          자세히 알아보기
      • 제로 트러스트 운영
        • 제로 트러스트 운영

          단일 콘솔에서 공격 표면 이해, 위험 실시간 분석, 그리고 네트워크, 워크로드 및 장치 전반에서 정책 조정

          자세히 알아보기
    • 역할별
      • 역할별
        • 역할별
          자세히 알아보기
      • CISO
        • CISO

          측정 가능한 사이버 보안 성과로 비즈니스 가치 향상

          자세히 알아보기
      • SOC 관리자
        • SOC 관리자

          더 많은 위협에 빠르게 대응

          자세히 알아보기
      • 인프라 관리자
        • 인프라 관리자

          보안을 강화해 위협을 빠르고 효과적으로 완화

          자세히 알아보기
      • 클라우드 빌더 및 개발자
        • 클라우드 빌더 및 개발자

          코드가 의도대로 실행되는지 확인

          자세히 알아보기
      • 클라우드 보안 Ops
        • 클라우드 보안 Ops

          클라우드 환경용 보안으로 가시성과 제어력 확보

          자세히 알아보기
    • 산업별
      • 산업별
        • 산업별
          자세히 알아보기
      • Healthcare
        • 의료 서비스

          의료 서비스 규정을 준수하면서 환자 데이터, 장치 및 네트워크 보호

          자세히 알아보기
      • Manufacturing
        • 제조

          기존 장치에서 최첨단 인프라에 이르기까지 공장 환경 보호

          자세히 알아보기
      • 석유 및 가스
        • 석유 및 가스

          석유 및 가스 설비 산업을 위한 ICS/OT 보안

          자세히 알아보기
      • 전기 유틸리티
        • 전기 유틸리티

          전기 유틸리티를 위한 ICS/OT 보안

          자세히 알아보기
      • 자동차
        • 자동차
          자세히 알아보기
      • 5G 네트워크
        • 5G 네트워크
          자세히 알아보기
    • 중소기업 보안
      • 중소기업 보안

        종합적인 보호 기능으로 위협 차단

        자세히 알아보기
  • 플랫폼
    • Vision One 플랫폼
      • Vision One 플랫폼
        • Trend Vision One
          트렌드마이크로의 통합된 플랫폼

          위협 방지와 사이버 위험 관리를 연결하여 보안 성과를 강화하십시오

          자세히 알아보기
      • AI 컴패니언
        • Trend Vision One Companion

          생성형 AI 사이버 보안 도우미

          자세히 보기
    • 엔드포인트 보안
      • 엔드포인트 보안
        • 엔드포인트 보안 개요

          공격의 모든 단계에서 엔드포인트 방어

          자세히 알아보기
      • 워크로드 보안
        • 워크로드 보안

          엔드포인트, 서버 및 클라우드 워크로드에 대한 최적화된 보호, 탐지 및 대응

          자세히 알아보기
      • 산업 엔드포인트 보안
        • 산업 엔드포인트 보안
          자세히 알아보기
      • 모바일 보안
        • 모바일 보안

          멀웨어, 악성 애플리케이션 및 기타 모바일 위협에 대한 온프레미스 및 클라우드 보호

          자세히 알아보기
      • 엔드포인트용 XDR
        • 엔드포인트용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
    • 클라우드 보안
      • 클라우드 보안
        • Trend Vision One™
          클라우드 보안 개요

          개발자, 보안 팀, 기업을 위한 가장 신뢰할 수 있는 클라우드 보안 플랫폼

          자세히 알아보기
      • Workload Security
        • 워크로드 보안

          CNAPP 기능을 지원하는 클라우드 보안 플랫폼을 활용하여 성능 손상 없이 데이터 센터, 클라우드 및 컨테이너를 보호합니다.

          자세히 알아보기
      • Container Security
        • Container Security

          고급 컨테이너 이미지 스캔, 정책 기반 승인 제어, 컨테이너 런타임 보호를 통해 클라우드 네이티브 애플리케이션의 보안을 단순화합니다.

          자세히 알아보기
      • File Storage Security
        • File Storage Security

          클라우드 네이티브 애플리케이션 아키텍처를 활용하는 클라우드 파일/개체 스토리지 서비스를 위한 보안

          자세히 알아보기
      • 클라우드용 공격 표면 위험 관리
        • 클라우드용 공격 표면 위험 관리

          단일 솔루션으로 클라우드 자산 탐색, 취약성 우선 순위 지정, 클라우드 보안 태세 관리, 공격 표면 관리 제공

          자세히 알아보기
      • 클라우드용 XDR
        • 클라우드용 XDR

          클라우드에 대한 가시성을 확장하고 SOC 조사를 간소화하십시오.

          자세히 알아보기
    • 네트워크 보안
      • 네트워크 보안
        • 네트워크 보안 개요

          네트워크 탐지 및 대응으로 XDR 성능 확장

          자세히 알아보기
      • 네트워크 침입 방지(IPS)
        • 네트워크 침입 방지(IPS)

          알려지거나 알려지지 않거나, 또는 공개되지 않은 취약점으로부터 네트워크를 보호합니다

          자세히 알아보기
      • Breach Detection System(BDS)
        • Breach Detection System(BDS)

          인바운드, 아웃바운드 및 측면으로 이동하는 표적 공격을 탐지하고 이에 대응합니다.

          자세히 알아보기
      • 시큐어 서비스 엣지(SSE)
        • 시큐어 서비스 엣지(SSE)

          지속적인 위험 평가를 통해 신뢰할 수 있고 안전한 디지털 혁신을 새롭게 재정립

          자세히 알아보기
      • 산업 네트워크 보안
        • 산업 네트워크 보안
          자세한 내용
      • 네트워크용 XDR
        • 네트워크용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
      • 5G 네트워크 보안
        • 5G 네트워크 보안
          자세히 알아보기
    • 모든 제품, 서비스 및 평가판
      • 모든 제품, 서비스 및 평가판
        자세히 알아보기
    • 공격 표면 관리
      • 공격 표면 관리

        발생 전에 침해 차단하기

        자세히 알아보기
    • 이메일 보안
      • 이메일 보안
        • 이메일 보안

          피싱, 멀웨어, 랜섬웨어, 사기 및 표적형 공격이 기업에 침투하는 것을 방지합니다.

          자세히 보기
      • 이메일 및 협업 보안
        • Trend Vision One™
          이메일 및 협업 보안

          Microsoft 365 및 Google Workspace를 비롯한 모든 전자 메일 서비스에서 피싱, 랜섬웨어 및 표적 공격 차단

          자세히 보기
    • XDR(확장된 탐지 및 대응)
      • XDR(확장된 탐지 및 대응)

        위협을 더 빠르게 추적하고, 탐지하고, 조사 및 대응하기 위해 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하십시오.

        자세히 알아보기
    • 위협 인텔리전스
      • 위협 인텔리전스

        지속적인 위협 예방 및 분석을 통해 최신 위협보다 한발 앞서나가고 중요 데이터를 보호하십시오.

        자세히 알아보기
    • IoT 보안
      • IoT 보안
        • IoT 보안

          ICS/OT 보안을 위한 솔루션에 대해 알아보십시오.

          자세히 알아보기
      • 산업 엔드포인트 보안
        • 산업 엔드포인트 보안
          자세히 알아보기
      • 산업 네트워크 보안
        • 산업 네트워크 보안
          산업 네트워크 보안
      • OT용 XDR
        • OT용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
  • 리서치
    • 리서치
      • 리서치
        • 리서치
          자세히 알아보기
      • 리서치, 뉴스 및 전망
        • 리서치, 뉴스 및 전망
          자세히 알아보기
      • 리서치 결과 및 분석 보고서
        • 리서치 결과 및 분석 보고서
          자세히 알아보기
      • 보안 뉴스
        • 보안 뉴스
          자세히 알아보기
      • 제로 데이 이니셔티브(ZDI)
        • 제로 데이 이니셔티브(ZDI)
          자세히 알아보기
  • 서비스
    • 트렌드마이크로 서비스
      • 트렌드마이크로 서비스
        • 트렌드마이크로 서비스
          자세히 알아보기
      • 서비스 패키지
        • 서비스 패키지

          연중무휴 관리형 탐지 및 대응, 지원을 통해 보안 팀의 역량을 강화하십시오

          자세히 알아보기
      • Managed XDR
        • Managed XDR

          이메일, 엔드포인트, 서버, 클라우드 워크로드 및 네트워크를 위한 전문 관리형 탐지 및 대응(MDR)으로 팀을 확장합니다.

          자세히 알아보기
      • 사고 대응
        • 사고 대응
          • 사고 대응

            귀사가 위반을 경험하고 있거나 IR 계획을 선제적으로 개선하고자 하는 경우 신뢰할 수 있는 전문가가 대기하고 있습니다.

            자세히 알아보기
        • 보험사 및 로펌
          • 보험사 및 로펌

            업계 최고의 탐지 및 대응 기술로 위협을 차단하고 고객의 청구 비용 및 다운 타임을 줄이십시오.

            자세히 알아보기
      • 지원 서비스
        • 지원 서비스
          자세히 알아보기
  • 파트너
    • 파트너 프로그램
      • 파트너 프로그램
        • 파트너 프로그램 개요

          업계 최고의 완벽한 다계층 보안을 통해 비즈니스를 성장 시키고 고객을 보호하십시오.

          자세히 알아보기
      • 관리형 보안 서비스 제공업체
        • 관리형 보안 서비스 제공업체

          업계 최고의 XDR로 최신 보안 운영 서비스 제공

          자세히 알아보기
      • Managed Service Provider
        • 관리 서비스 공급자(MSP)

          클라우드 보안 글로벌 마켓을 리드하는 트렌드마이크로 Deep Security

          자세히 알아보기
      • Cloud Service Provider
        • 클라우드 서비스 공급자(CSP)

          사용하는 플랫폼에 관계없이 클라우드 서비스 오퍼링에 시장을 선도하는 보안을 추가하십시오.

          자세히 알아보기
      • 전문가 서비스
        • 전문가 서비스

          업계 최고의 보안 파트너를 통한 매출 증대

          자세히 알아보기
      • 리셀러
        • 리셀러

          가능성 알아보기

          자세히 알아보기
      • 마켓플레이스
        • 마켓플레이스
          자세히 알아보기
      • 시스템 통합 벤더
        • 시스템 통합업체
          자세히 알아보기
    • 제휴 파트너
      • 제휴 파트너
        • 제휴 개요

          트렌드마이크로는 성과와 가치를 높이기 위해 최선의 노력을 다하고 있습니다.

          자세히 알아보기
      • 기술 제휴 파트너
        • 기술 제휴 파트너
          자세히 알아보기
      • 트렌드마이크로의 전략적 제휴 파트너
        • 트렌드마이크로의 전략적 제휴 파트너
          자세히 알아보기
    • 파트너 도구
      • 파트너 도구
        • 파트너 도구
          자세히 알아보기
      • 파트너 로그인
        • 파트너 로그인
          로그인
      • 교육 및 인증
        • 교육 및 인증
          자세히 알아보기
      • 파트너 성공
        • 파트너 성공
          자세히 알아보기
      • 유통 업체
        • 유통 업체
          자세히 알아보기
      • 파트너 찾기
        • 파트너 찾기
          자세히 보기
  • 회사
    • 트렌드마이크로를 선택해야 하는 이유
      • 트렌드마이크로를 선택해야 하는 이유
        • 트렌드마이크로를 선택해야 하는 이유
          자세히 보기
      • 고객 성공 사례
        • 고객 성공 사례
          자세히 알아보기
      • 수상 경력
        • 수상 경력
          자세히 알아보기
      • 전략적 제휴
        • 전략적 제휴
          자세히 알아보기
      • 인재 채용
        • 인재 채용
          자세히 알아보기
    • 트렌드마이크로 비교
      • 트렌드마이크로 비교
        • 트렌드마이크로 비교

          트렌드마이크로가 경쟁 우위를 차지하는 방법 알아보기

          시작하기
      • CrowdStrike와 비교
        • 트렌드마이크로 대 CrowdStrike

          Crowdstrike는 클라우드 네이티브 플랫폼을 통해 효과적인 사이버 보안을 제공하지만, 진정한 단일 플랫폼을 통한 비용 효율성을 극대화하고자 하는 조직의 경우 클라우드 네이티브 플랫폼의 가격으로 인해 예산이 늘어날 수 있습니다.

          시작하기
      • Microsoft와 비교
        • 트렌드마이크로 대 Microsoft

          Microsoft는 기본적인 보안 계층을 제공하지만, 고객의 보안 문제를 완전히 해결하기 위해서는 보완 솔루션이 필요한 경우가 많습니다.

          시작하기
      • Palo Alto Networks와 비교
        • 트렌드마이크로 대 Palo Alto Networks

          Palo Alto Networks는 고급 사이버 보안 솔루션을 제공하지만, 포괄적인 제품군을 탐색하는 것은 복잡할 수 있으며 모든 기능을 활용하려면 상당한 예산을 투자해야 합니다.

          시작하기
    • 당사 소개
      • 당사 소개
        • 당사 소개
          자세히 알아보기
      • Trust Center
        • Trust Center
          자세히 알아보기
      • 역사
        • 역사
          자세히 알아보기
      • 다양성, 형평성 및 포용성
        • 다양성, 형평성 및 포용성
          자세히 알아보기
      • 기업의 사회적 책임
        • 기업의 사회적 책임
          자세히 알아보기
      • 리더십
        • 리더십
          자세히 알아보기
      • 보안 전문가
        • 보안 전문가
          자세히 알아보기
      • 인터넷 안전과 사이버 보안 교육
        • 인터넷 안전과 사이버 보안 교육
          자세히 알아보기
      • 법률
        • 법률
          자세히 알아보기
      • 투자자
        • 투자자
          자세히 알아보기
      • 포뮬러 E 레이싱
        • 포뮬러 E 레이싱
          자세히 보기
    • 최신 뉴스
      • 최신 뉴스
        • 최신 뉴스
          자세히 알아보기
      • 뉴스룸
        • 뉴스룸
          자세히 알아보기
      • 이벤트
        • 이벤트
          자세히 알아보기
      • 커리어
        • 인재 채용
          자세히 알아보기
      • 웨비나
        • 웨비나
          자세히 알아보기
  • 무료 평가판
  • 문의
가정용 제품을 찾으십니까?
사이버 공격을 받고 있습니까?
지원
  • 기업 지원 포털
  • 교육 및 인증
  • 지원 연락처
  • 지원 파트너 찾기
리소스
  • 트렌드마이크로 대 경쟁사
  • 사이버 위험 지수/평가
  • CISO 리소스 센터
  • DevOps 리소스 센터
  • 정의
  • 위협 백과사전
  • 클라우드 상태 평가
  • 사이버 보험
  • 용어집
  • 웨비나
로그인
  • Vision One
  • 지원
  • 파트너 포털
  • Cloud One
  • 제품 활성화 및 관리
  • Referral 제휴사
arrow_back
search
close
  • Threat Encyclopedia
  • Network Content Inspection Rules

Network Content Inspection Rules

    Confidence Level:  
    Low
    Medium
    High
    Default Rule:  
    Rule IDRule DescriptionConfidence LevelDDI Default RuleNetwork Content Inspection Pattern Release Date
    DDI RULE 5394 CVE-2024-57050 - TPLINK EXPLOIT - HTTP(Response) High
    2025/05/13DDI RULE 5394/vinfo/kr/threat-encyclopedia/network/ddi-rule-5394
    DDI RULE 5392 CVE-2024-23468 - SOLARWINDS PATH TRAVERSAL - TCP (Request) High
    2025/05/07DDI RULE 5392/vinfo/kr/threat-encyclopedia/network/ddi-rule-5392
    DDI RULE 5387 CVE-2023-44221 - SONICWALL EXPLOIT COMMAND INJECTION EXPLOIT - HTTP(RESPONSE) High
    2025/05/03DDI RULE 5387/vinfo/kr/threat-encyclopedia/network/ddi-rule-5387
    DDI RULE 5385 CVE-2021-47667 - ZENDTO RCE - HTTP (Request) High
    2025/04/30DDI RULE 5385/vinfo/kr/threat-encyclopedia/network/ddi-rule-5385
    DDI RULE 5382 CVE-2025-31324 - SAP NETWEAVER UPLOAD EXPLOIT REQUEST - HTTP(REQUEST) High
    2025/04/26DDI RULE 5382/vinfo/kr/threat-encyclopedia/network/ddi-rule-5382
    DDI RULE 5377 ROUTER CLEARTEXT PASSWORD DISCLOSURE EXPLOIT - HTTP (Request) High
    2025/04/22DDI RULE 5377/vinfo/kr/threat-encyclopedia/network/ddi-rule-5377
    DDI RULE 5375 CVE-2024-10188 - LITELLM DOS - HTTP (Request) High
    2025/04/16DDI RULE 5375/vinfo/kr/threat-encyclopedia/network/ddi-rule-5375
    DDI RULE 5369 IVANTI TRAVERSAL EXPLOIT - HTTP(Response) High
    2025/04/15DDI RULE 5369/vinfo/kr/threat-encyclopedia/network/ddi-rule-5369
    DDI RULE 5363 CVE-2024-50330 - IVANTI SQL INJECTION - HTTP (Response) High
    2025/04/02DDI RULE 5363/vinfo/kr/threat-encyclopedia/network/ddi-rule-5363
    DDI RULE 5359 CVE-2018-8639 - Win32k Privilege Escalation Exploit - HTTP (Response) High
    2025/03/26DDI RULE 5359/vinfo/kr/threat-encyclopedia/network/ddi-rule-5359
    DDI RULE 5353 CVE-2024-45195 - APACHE OFBIZ RCE EXPLOIT - HTTP(Request) High
    2025/03/17DDI RULE 5353/vinfo/kr/threat-encyclopedia/network/ddi-rule-5353
    DDI RULE 5349 SVCCTL Start Service - SMB2 (Request) High
    2025/03/13DDI RULE 5349/vinfo/kr/threat-encyclopedia/network/ddi-rule-5349
    DDI RULE 5340 LBLINK COMMAND INJECTION EXPLOIT - HTTP (Request) High
    2025/03/05DDI RULE 5340/vinfo/kr/threat-encyclopedia/network/ddi-rule-5340
    DDI RULE 5323 CVE-2024-49112 - INTEGER OVERFLOW EXPLOIT - LDAP (Response) High
    2025/02/20DDI RULE 5323/vinfo/kr/threat-encyclopedia/network/ddi-rule-5323
    DDI RULE 5305 CVE-2024-42327 - Zabbix SQL Injection - HTTP (Response) High
    2025/02/18DDI RULE 5305/vinfo/kr/threat-encyclopedia/network/ddi-rule-5305
    DDI RULE 5318 CVE-2025-0282 - IVANTI RCE EXPLOIT - HTTP(Request) High
    2025/02/17DDI RULE 5318/vinfo/kr/threat-encyclopedia/network/ddi-rule-5318
    DDI RULE 5320 CVE-2025-0107 - Palo Alto Networks Expedition Insecure Deserialization Exploit - HTTP (Response) High
    2025/02/17DDI RULE 5320/vinfo/kr/threat-encyclopedia/network/ddi-rule-5320
    DDI RULE 5316 CVE-2024-37404 - IVANTI RCE EXPLOIT - HTTP (Response) High
    2025/02/12DDI RULE 5316/vinfo/kr/threat-encyclopedia/network/ddi-rule-5316
    DDI RULE 5314 ADCS Suspicious use of Certificate - Kerberos (Request) High
    2025/02/11DDI RULE 5314/vinfo/kr/threat-encyclopedia/network/ddi-rule-5314
    DDI RULE 5312 CVE-2024-40711 - Veeam Backup & Replication Remote Command Execution Exploit - HTTP (Response) High
    2025/02/06DDI RULE 5312/vinfo/kr/threat-encyclopedia/network/ddi-rule-5312
    DDI RULE 5310 CVE-2024-52047 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (Request) High
    2025/02/06DDI RULE 5310/vinfo/kr/threat-encyclopedia/network/ddi-rule-5310
    DDI RULE 5311 CVE-2022-22947 - SPRINGCLOUD RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5311/vinfo/kr/threat-encyclopedia/network/ddi-rule-5311
    DDI RULE 5303 CVE-2024-51378 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5303/vinfo/kr/threat-encyclopedia/network/ddi-rule-5303
    DDI RULE 5292 CVE-2024-47575 - FORTIMANAGER RCE EXPLOIT - HTTP (Response) High
    2025/02/04DDI RULE 5292/vinfo/kr/threat-encyclopedia/network/ddi-rule-5292
    DDI RULE 5304 CVE-2024-12828 - WEBMIN RCE EXPLOIT - HTTP (Response) High
    2025/01/30DDI RULE 5304/vinfo/kr/threat-encyclopedia/network/ddi-rule-5304
    DDI RULE 5306 CVE-2024-53691 - QNAP RCE - HTTP (Request) High
    2025/01/30DDI RULE 5306/vinfo/kr/threat-encyclopedia/network/ddi-rule-5306
    DDI RULE 5307 CVE-2024-50388 - QNAP BACKUP EXPLOIT - HTTP(Request) High
    2025/01/30DDI RULE 5307/vinfo/kr/threat-encyclopedia/network/ddi-rule-5307
    DDI RULE 5302 CVE-2024-8963 - IVANTI AUTH BYPASS EXPLOIT - HTTP (Response) High
    2025/01/24DDI RULE 5302/vinfo/kr/threat-encyclopedia/network/ddi-rule-5302
    DDI RULE 5300 CVE-2024-29847 - IVANTI RCE EXPLOIT - TCP (Request) High
    2025/01/22DDI RULE 5300/vinfo/kr/threat-encyclopedia/network/ddi-rule-5300
    DDI RULE 5301 CVE-2024-50603 - AVIATRIX COMMAND INJECTION - HTTP (Request) High
    2025/01/21DDI RULE 5301/vinfo/kr/threat-encyclopedia/network/ddi-rule-5301
    DDI RULE 5246 Entropy Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5246/vinfo/kr/threat-encyclopedia/network/ddi-rule-5246
    DDI RULE 5247 Base64 Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5247/vinfo/kr/threat-encyclopedia/network/ddi-rule-5247
    DDI RULE 5299 HTTP Websocket Connection to External Server (Request) Low
    2025/01/16DDI RULE 5299/vinfo/kr/threat-encyclopedia/network/ddi-rule-5299
    DDI RULE 1268 Reverse HTTPS Meterpreter detected - Variant 2 High
    2025/01/15DDI RULE 1268/vinfo/kr/threat-encyclopedia/network/ddi-rule-1268
    DDI RULE 5298 CVE-2024-5011 - WHATSUP GOLD EXPLOIT - HTTP (Request) High
    2025/01/15DDI RULE 5298/vinfo/kr/threat-encyclopedia/network/ddi-rule-5298
    DDI RULE 2744 OMRON FINS UDP Read Controller Attempt NSE - UDP (Request) Low
    2025/01/13DDI RULE 2744/vinfo/kr/threat-encyclopedia/network/ddi-rule-2744
    DDI RULE 5294 CVE-2024-38856 - OFBIZ AUTHBYPASS EXPLOIT - HTTP (Response) High
    2025/01/08DDI RULE 5294/vinfo/kr/threat-encyclopedia/network/ddi-rule-5294
    DDI RULE 5289 CVE-2024-49122 - MSMQ RCE EXPLOIT - TCP (Response) High
    2025/01/07DDI RULE 5289/vinfo/kr/threat-encyclopedia/network/ddi-rule-5289
    DDI RULE 5297 CVE-2024-49113 - WINDOWS LDAP DOS EXPLOIT - CLDAP(RESPONSE) High
    2025/01/06DDI RULE 5297/vinfo/kr/threat-encyclopedia/network/ddi-rule-5297
    DDI RULE 5290 CVE-2024-9464 - PaloAlto Command Injection Exploit - HTTP (Request) High
    2025/01/06DDI RULE 5290/vinfo/kr/threat-encyclopedia/network/ddi-rule-5290
    DDI RULE 5295 CVE-2024-50623 - CLEO DIRECTORY TRAVERSAL - HTTP (Request) High
    2025/01/02DDI RULE 5295/vinfo/kr/threat-encyclopedia/network/ddi-rule-5295
    DDI RULE 5291 CVE-2024-25153 - Fortra FileCatalyst Workflow Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5291/vinfo/kr/threat-encyclopedia/network/ddi-rule-5291
    DDI RULE 5293 CVE-2024-11320 - Pandora Remote Command Execution Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5293/vinfo/kr/threat-encyclopedia/network/ddi-rule-5293
    DDI RULE 5288 CVE-2024-46938 - Sitecore Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5288/vinfo/kr/threat-encyclopedia/network/ddi-rule-5288
    DDI RULE 4594 COBALTSTRIKE - HTTP(REQUEST) - Variant 3 High
    2024/12/11DDI RULE 4594/vinfo/kr/threat-encyclopedia/network/ddi-rule-4594
    DDI RULE 4861 COBEACON - DNS (Response) - Variant 3 High
    2024/12/11DDI RULE 4861/vinfo/kr/threat-encyclopedia/network/ddi-rule-4861
    DDI RULE 5287 Active Directory Certificate Services Template Discovery- LDAP (Request) High
    2024/12/11DDI RULE 5287/vinfo/kr/threat-encyclopedia/network/ddi-rule-5287
    DDI RULE 5284 CVE-2024-34051 - DOLIBARR AC EXECUTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5284/vinfo/kr/threat-encyclopedia/network/ddi-rule-5284
    DDI RULE 5253 CVE-2024-29830 - IVANTI SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5253/vinfo/kr/threat-encyclopedia/network/ddi-rule-5253
    DDI RULE 5281 AD File and Directory Discovery - SMB2 (Request) Medium
    2024/12/11DDI RULE 5281/vinfo/kr/threat-encyclopedia/network/ddi-rule-5281
    DDI RULE 5283 CVE-2024-9264 - Grafana SQL Injection Exploit - HTTP (Response) High
    2024/12/10DDI RULE 5283/vinfo/kr/threat-encyclopedia/network/ddi-rule-5283
    DDI RULE 5286 Possible Discovery Using NETSHAREENUM API - SMB2 (Request) High
    2024/12/10DDI RULE 5286/vinfo/kr/threat-encyclopedia/network/ddi-rule-5286
    DDI RULE 4396 CVE-2020-1967 - Signature Algorithms Cert Denial of Service - HTTPS (Request) Medium
    2024/12/09DDI RULE 4396/vinfo/kr/threat-encyclopedia/network/ddi-rule-4396
    DDI RULE 5285 CVE-2024-1884 - PAPERCUT SSRF EXPLOIT - HTTP(REQUEST) High
    2024/12/09DDI RULE 5285/vinfo/kr/threat-encyclopedia/network/ddi-rule-5285
    DDI RULE 5282 CVE-2024-43451 - WINDOWS NTLM RELAY EXPLOIT - HTTP (Response) High
    2024/12/09DDI RULE 5282/vinfo/kr/threat-encyclopedia/network/ddi-rule-5282
    DDI RULE 5279 CVE-2024-47525 - LIBRENMS XSS EXPLOIT - HTTP(REQUEST) High
    2024/12/04DDI RULE 5279/vinfo/kr/threat-encyclopedia/network/ddi-rule-5279
    DDI RULE 5280 CVE-2024-42008 - Roundcube Information Disclosure Exploit - HTTP (Response) High
    2024/12/03DDI RULE 5280/vinfo/kr/threat-encyclopedia/network/ddi-rule-5280
    DDI RULE 5276 CVE-2024-5010 - WHATSUP GOLD EXPLOIT - HTTP(REQUEST) High
    2024/12/02DDI RULE 5276/vinfo/kr/threat-encyclopedia/network/ddi-rule-5276
    DDI RULE 5232 CVE-2024-45519 - ZIMBRA RCE EXPLOIT - SMTP (REQUEST) High
    2024/12/02DDI RULE 5232/vinfo/kr/threat-encyclopedia/network/ddi-rule-5232
    DDI RULE 5278 CVE-2024-0012 - PALO ALTO AUTH BYPASS - HTTP (Request) High
    2024/11/28DDI RULE 5278/vinfo/kr/threat-encyclopedia/network/ddi-rule-5278
    DDI RULE 5267 COVENANT Custom Profile - HTTP (Response) - Variant 2 High
    2024/11/27DDI RULE 5267/vinfo/kr/threat-encyclopedia/network/ddi-rule-5267
    DDI RULE 5274 Covenant Default Named Pipe - SMB2 (Request) High
    2024/11/26DDI RULE 5274/vinfo/kr/threat-encyclopedia/network/ddi-rule-5274
    DDI RULE 5269 SALITY C2 - TCP (REQUEST) High
    2024/11/21DDI RULE 5269/vinfo/kr/threat-encyclopedia/network/ddi-rule-5269
    DDI RULE 5271 CVE-2024-43572 - Microsoft Windows Management Console RCE Exploit - HTTP (Response) High
    2024/11/21DDI RULE 5271/vinfo/kr/threat-encyclopedia/network/ddi-rule-5271
    DDI RULE 5268 CVE-2024-7591 - Progress Kemp LoadMaster Command Injection Exploit - HTTP (Request) High
    2024/11/19DDI RULE 5268/vinfo/kr/threat-encyclopedia/network/ddi-rule-5268
    DDI RULE 5264 CVE-2024-51567 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5264/vinfo/kr/threat-encyclopedia/network/ddi-rule-5264
    DDI RULE 5245 CVE-2024-6457 - WORDPRESS EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5245/vinfo/kr/threat-encyclopedia/network/ddi-rule-5245
    DDI RULE 5256 COVENANT Default - HTTP (Response) High
    2024/11/14DDI RULE 5256/vinfo/kr/threat-encyclopedia/network/ddi-rule-5256
    DDI RULE 5258 CVE-2024-9465 - PALOALTO EXPEDITION EXPLOIT - HTTP (Response) High
    2024/11/14DDI RULE 5258/vinfo/kr/threat-encyclopedia/network/ddi-rule-5258
    DDI RULE 5265 CVE-2024-40711 - VEEAM BACKUP RCE EXPLOIT - TCP (Request) High
    2024/11/14DDI RULE 5265/vinfo/kr/threat-encyclopedia/network/ddi-rule-5265
    DDI RULE 5263 CVE-2024-41874 - ADOBE COLDFUSION RCE EXPLOIT - HTTP (Response) High
    2024/11/13DDI RULE 5263/vinfo/kr/threat-encyclopedia/network/ddi-rule-5263
    DDI RULE 5262 CoreWarrior Exfiltration - HTTP (Request) High
    2024/11/12DDI RULE 5262/vinfo/kr/threat-encyclopedia/network/ddi-rule-5262
    DDI RULE 5259 FAKEWIN - HTTP (Request) High
    2024/11/11DDI RULE 5259/vinfo/kr/threat-encyclopedia/network/ddi-rule-5259
    DDI RULE 5260 RCSHELL BACKDOOR - HTTP (Request) High
    2024/11/11DDI RULE 5260/vinfo/kr/threat-encyclopedia/network/ddi-rule-5260
    DDI RULE 5261 HORUS PROTECTOR C2 - TCP (Response) High
    2024/11/11DDI RULE 5261/vinfo/kr/threat-encyclopedia/network/ddi-rule-5261
    DDI RULE 5257 CVE-2024-28988 - SOLARWINDS RCE EXPLOIT - HTTP (Response) High
    2024/11/07DDI RULE 5257/vinfo/kr/threat-encyclopedia/network/ddi-rule-5257
    DDI RULE 4484 GOLDENSPY - HTTP (REQUEST) High
    2024/11/06DDI RULE 4484/vinfo/kr/threat-encyclopedia/network/ddi-rule-4484
    DDI RULE 4219 GHOSTMINER - HTTP (Request) High
    2024/11/06DDI RULE 4219/vinfo/kr/threat-encyclopedia/network/ddi-rule-4219
    DDI RULE 4572 GLUPTEBA - HTTP (REQUEST) High
    2024/11/06DDI RULE 4572/vinfo/kr/threat-encyclopedia/network/ddi-rule-4572
    DDI RULE 5081 CVE-2024-36401 - GEOSERVER EXPLOIT - HTTP (REQUEST) High
    2024/11/06DDI RULE 5081/vinfo/kr/threat-encyclopedia/network/ddi-rule-5081
    DDI RULE 5139 PYC Download - HTTP (Response) Low
    2024/11/05DDI RULE 5139/vinfo/kr/threat-encyclopedia/network/ddi-rule-5139
    DDI RULE 5140 Python Download - HTTP (Response) Low
    2024/11/05DDI RULE 5140/vinfo/kr/threat-encyclopedia/network/ddi-rule-5140
    DDI RULE 1770 GHOLE - HTTP (Request) High
    2024/11/04DDI RULE 1770/vinfo/kr/threat-encyclopedia/network/ddi-rule-1770
    DDI RULE 5254 Possible Domain Controller List Discovery - DCERPC (Request) High
    2024/11/04DDI RULE 5254/vinfo/kr/threat-encyclopedia/network/ddi-rule-5254
    DDI RULE 5243 WebDAV Successful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5243/vinfo/kr/threat-encyclopedia/network/ddi-rule-5243
    DDI RULE 5244 WebDAV Unsuccessful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5244/vinfo/kr/threat-encyclopedia/network/ddi-rule-5244
    DDI RULE 5249 KeyLogEXE Exfiltration - HTTP (Request) High
    2024/10/28DDI RULE 5249/vinfo/kr/threat-encyclopedia/network/ddi-rule-5249
    DDI RULE 5250 C2 SHELLCODE Transfer - HTTP (Response) Low
    2024/10/24DDI RULE 5250/vinfo/kr/threat-encyclopedia/network/ddi-rule-5250
    DDI RULE 5251 REMCOS DOWNLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5251/vinfo/kr/threat-encyclopedia/network/ddi-rule-5251
    DDI RULE 5252 CONOLEATHLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5252/vinfo/kr/threat-encyclopedia/network/ddi-rule-5252
    DDI RULE 5248 URIVAR EXFILTRATION - HTTP(REQUEST) Low
    2024/10/24DDI RULE 5248/vinfo/kr/threat-encyclopedia/network/ddi-rule-5248
    DDI RULE 1886 Data Exfiltration - DNS (Response) Low
    2024/10/22DDI RULE 1886/vinfo/kr/threat-encyclopedia/network/ddi-rule-1886
    DDI RULE 5238 CVE-2024-32766 - PRIVWIZARD INJECTION EXPLOIT - HTTP (Request) High
    2024/10/22DDI RULE 5238/vinfo/kr/threat-encyclopedia/network/ddi-rule-5238
    DDI RULE 5240 CVE-2024-5932 - WordPress RCE Exploit - HTTP (Request) High
    2024/10/17DDI RULE 5240/vinfo/kr/threat-encyclopedia/network/ddi-rule-5240
    DDI RULE 5231 CVE-2024-32842 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/16DDI RULE 5231/vinfo/kr/threat-encyclopedia/network/ddi-rule-5231
    DDI RULE 5242 CVE-2024-5932 - GIVEWP RCE EXPLOIT - HTTP (Request) High
    2024/10/16DDI RULE 5242/vinfo/kr/threat-encyclopedia/network/ddi-rule-5242
    DDI RULE 5241 CVE-2024-37397 - Ivanti EPM Improper Restriction of XML External Entity Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5241/vinfo/kr/threat-encyclopedia/network/ddi-rule-5241
    DDI RULE 5230 CVE-2024-32845 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5230/vinfo/kr/threat-encyclopedia/network/ddi-rule-5230
    DDI RULE 5239 SYSTEMBC Shellcode Download - HTTP (Response) High
    2024/10/14DDI RULE 5239/vinfo/kr/threat-encyclopedia/network/ddi-rule-5239
    DDI RULE 5229 Advanced Port Scanner - HTTP (Request) High
    2024/10/10DDI RULE 5229/vinfo/kr/threat-encyclopedia/network/ddi-rule-5229
    DDI RULE 5233 CVE-2024-32846 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5233/vinfo/kr/threat-encyclopedia/network/ddi-rule-5233
    DDI RULE 5234 CVE-2024-32843 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5234/vinfo/kr/threat-encyclopedia/network/ddi-rule-5234
    DDI RULE 5235 CVE-2024-34779 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5235/vinfo/kr/threat-encyclopedia/network/ddi-rule-5235
    DDI RULE 5236 CVE-2024-34785 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5236/vinfo/kr/threat-encyclopedia/network/ddi-rule-5236
    DDI RULE 5237 SYSTEMBC C2 - HTTP (Request) High
    2024/10/10DDI RULE 5237/vinfo/kr/threat-encyclopedia/network/ddi-rule-5237
    DDI RULE 5227 VALLEYRAT C2 - TCP (Response) High
    2024/10/09DDI RULE 5227/vinfo/kr/threat-encyclopedia/network/ddi-rule-5227
    DDI RULE 5228 Advanced IP Scanner - HTTP (Request) High
    2024/10/09DDI RULE 5228/vinfo/kr/threat-encyclopedia/network/ddi-rule-5228
    DDI RULE 5225 ONCESVC C2 - HTTP (Response) High
    2024/10/08DDI RULE 5225/vinfo/kr/threat-encyclopedia/network/ddi-rule-5225
    DDI RULE 5226 CVE-2024-6497 - SQUIRLLY EXPLOIT - HTTP (Request) High
    2024/10/08DDI RULE 5226/vinfo/kr/threat-encyclopedia/network/ddi-rule-5226
    DDI RULE 5223 LUMMAC - HTTP (Request) High
    2024/10/03DDI RULE 5223/vinfo/kr/threat-encyclopedia/network/ddi-rule-5223
    DDI RULE 5221 CVE-2024-47177 - CUPS PRINTING RCE EXPLOIT - HTTP (REQUEST) High
    2024/10/03DDI RULE 5221/vinfo/kr/threat-encyclopedia/network/ddi-rule-5221
    DDI RULE 5222 CVE-2024-2876 - WORDPRESS SQL INJECTION EXPLOIT - HTTP (Request) High
    2024/10/02DDI RULE 5222/vinfo/kr/threat-encyclopedia/network/ddi-rule-5222
    DDI RULE 5217 CVE-2024-8190 - Ivanti Cloud Service Appliance Authenticated Command Injection Exploit - HTTP (Response) High
    2024/10/02DDI RULE 5217/vinfo/kr/threat-encyclopedia/network/ddi-rule-5217
    DDI RULE 5218 CVE-2020-8599 - Trend Micro Apex One and OfficeScan Directory Traversal Exploit - HTTP (Request) High
    2024/10/01DDI RULE 5218/vinfo/kr/threat-encyclopedia/network/ddi-rule-5218
    DDI RULE 5219 CVE-2024-38077 - MS RDL RCE EXPLOIT - DCERPC (Request) High
    2024/10/01DDI RULE 5219/vinfo/kr/threat-encyclopedia/network/ddi-rule-5219
    DDI RULE 5220 CVE-2024-6670 - WhatsUp SQL Injection Exploit - HTTP (Response) High
    2024/10/01DDI RULE 5220/vinfo/kr/threat-encyclopedia/network/ddi-rule-5220
    DDI RULE 5216 Possible Generic Database Query - MySQL (Request) Medium
    2024/09/26DDI RULE 5216/vinfo/kr/threat-encyclopedia/network/ddi-rule-5216
    DDI RULE 5206 Remote Access Tool VNC - VNC (Response) High
    2024/09/23DDI RULE 5206/vinfo/kr/threat-encyclopedia/network/ddi-rule-5206
    DDI RULE 5207 Remote Access Tool RealVNC - VNC (Response) High
    2024/09/23DDI RULE 5207/vinfo/kr/threat-encyclopedia/network/ddi-rule-5207
    DDI RULE 5208 Remote Access Tool TightVNC - VNC (Response) High
    2024/09/23DDI RULE 5208/vinfo/kr/threat-encyclopedia/network/ddi-rule-5208
    DDI RULE 5209 Remote Access Tool UltraVNC - VNC (Response) High
    2024/09/23DDI RULE 5209/vinfo/kr/threat-encyclopedia/network/ddi-rule-5209
    DDI RULE 5214 CVE-2024-5505 - NETGEAR TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/09/17DDI RULE 5214/vinfo/kr/threat-encyclopedia/network/ddi-rule-5214
    DDI RULE 5215 CVE-2024-43461 - MSHTML SPOOFING EXPLOIT - HTTP (RESPONSE) High
    2024/09/17DDI RULE 5215/vinfo/kr/threat-encyclopedia/network/ddi-rule-5215
    DDI RULE 5082 CVE-2024-32113 - Apache OFBiz Directory Traversal Exploit - HTTP (Request) High
    2024/09/16DDI RULE 5082/vinfo/kr/threat-encyclopedia/network/ddi-rule-5082
    DDI RULE 5212 CVE-2023-51364 - QNAP RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/12DDI RULE 5212/vinfo/kr/threat-encyclopedia/network/ddi-rule-5212
    DDI RULE 5213 WebP Image Sensor - HTTP (Response) High
    2024/09/12DDI RULE 5213/vinfo/kr/threat-encyclopedia/network/ddi-rule-5213
    DDI RULE 5211 CVE-2023-38205 - Adobe ColdFusion Policy Bypass Exploit - HTTP (Request) High
    2024/09/11DDI RULE 5211/vinfo/kr/threat-encyclopedia/network/ddi-rule-5211
    DDI RULE 5210 Metasploit Web Delivery through PowerShell - HTTP (Response) Medium
    2024/09/10DDI RULE 5210/vinfo/kr/threat-encyclopedia/network/ddi-rule-5210
    DDI RULE 2793 APT - WINNTI - HTTP (Response) High
    2024/09/09DDI RULE 2793/vinfo/kr/threat-encyclopedia/network/ddi-rule-2793
    DDI RULE 5203 CVE-2024-5721 - LOGSIGN RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5203/vinfo/kr/threat-encyclopedia/network/ddi-rule-5203
    DDI RULE 5204 CVE-2024-7928 - FASTADMIN TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5204/vinfo/kr/threat-encyclopedia/network/ddi-rule-5204
    DDI RULE 5205 CVE-2024-29826 - IVANTI ENDPOINT RCE EXPLOIT - HTTP (REQUEST) High
    2024/09/05DDI RULE 5205/vinfo/kr/threat-encyclopedia/network/ddi-rule-5205
    DDI RULE 5200 CVE-2024-38652 - IVANTI TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/04DDI RULE 5200/vinfo/kr/threat-encyclopedia/network/ddi-rule-5200
    DDI RULE 5202 MAGICRAT EXFIL - HTTP(REQUEST) High
    2024/09/04DDI RULE 5202/vinfo/kr/threat-encyclopedia/network/ddi-rule-5202
    DDI RULE 5097 CVE-2023-27532 - Veeam Backup and Replication Backup Service Authentication Bypass Exploit - TCP (Request) High
    2024/09/04DDI RULE 5097/vinfo/kr/threat-encyclopedia/network/ddi-rule-5097
    DDI RULE 4345 EMOTET - HTTP (Request) - Variant 7 High
    2024/09/03DDI RULE 4345/vinfo/kr/threat-encyclopedia/network/ddi-rule-4345
    DDI RULE 5098 JUPITERRAT - HTTP (REQUEST) High
    2024/08/29DDI RULE 5098/vinfo/kr/threat-encyclopedia/network/ddi-rule-5098
    DDI RULE 5099 FAKEBAT DOWNLOADER - HTTP(REQUEST) High
    2024/08/29DDI RULE 5099/vinfo/kr/threat-encyclopedia/network/ddi-rule-5099
    DDI RULE 5090 CVE-2021-26858 - Possible MS Exchange SSRF Exploit - HTTP (Response) Low
    2024/08/28DDI RULE 5090/vinfo/kr/threat-encyclopedia/network/ddi-rule-5090
    DDI RULE 5096 ZOMBIEDROP - HTTP (REQUEST) High
    2024/08/27DDI RULE 5096/vinfo/kr/threat-encyclopedia/network/ddi-rule-5096
    DDI RULE 5095 CVE-2024-4885 - WHATSUP GOLD TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5095/vinfo/kr/threat-encyclopedia/network/ddi-rule-5095
    DDI RULE 5075 CVE-2024-49606 - TINYPROXY RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5075/vinfo/kr/threat-encyclopedia/network/ddi-rule-5075
    DDI RULE 5092 CVE-2024-7120 - RAISECOM COMMAND INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/08/20DDI RULE 5092/vinfo/kr/threat-encyclopedia/network/ddi-rule-5092
    DDI RULE 5093 Prometei C2 - HTTP (Request) High
    2024/08/20DDI RULE 5093/vinfo/kr/threat-encyclopedia/network/ddi-rule-5093
    DDI RULE 5094 Possible STEALBIT Exfiltration - HTTP (Request) Medium
    2024/08/20DDI RULE 5094/vinfo/kr/threat-encyclopedia/network/ddi-rule-5094
    DDI RULE 5091 RUTHENS ENCRYPTION - SMB2 (REQUEST) High
    2024/08/19DDI RULE 5091/vinfo/kr/threat-encyclopedia/network/ddi-rule-5091
    DDI RULE 5087 DAMEWARE RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/15DDI RULE 5087/vinfo/kr/threat-encyclopedia/network/ddi-rule-5087
    DDI RULE 5088 Possible Faker Generated Self-Signed Certificate - HTTPS Medium
    2024/08/14DDI RULE 5088/vinfo/kr/threat-encyclopedia/network/ddi-rule-5088
    DDI RULE 5089 COBEACON Default Named Pipe - SMB2 (Request) - Variant 2 Medium
    2024/08/14DDI RULE 5089/vinfo/kr/threat-encyclopedia/network/ddi-rule-5089
    DDI RULE 5085 CVE-2024-5008 - WHATSUP GOLD RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/13DDI RULE 5085/vinfo/kr/threat-encyclopedia/network/ddi-rule-5085
    DDI RULE 5086 CVE-2019-0708 - Microsoft Windows Remote Desktop Services Remote Code Execution Exploit - TCP (Request) High
    2024/08/13DDI RULE 5086/vinfo/kr/threat-encyclopedia/network/ddi-rule-5086
    DDI RULE 5079 CVE-2023-42000 - Arcserve Unified Data Protection Path Traversal Exploit - HTTP (Request) High
    2024/08/12DDI RULE 5079/vinfo/kr/threat-encyclopedia/network/ddi-rule-5079
    DDI RULE 5084 CVE-2024-4883 - Progress WhatsUp Gold Traversal Exploit - TCP (Request) High
    2024/08/12DDI RULE 5084/vinfo/kr/threat-encyclopedia/network/ddi-rule-5084
    DDI RULE 5083 CVE-2024-38856 - APACHE OFBIZ RCE EXPLOIT - HTTP (Request) High
    2024/08/09DDI RULE 5083/vinfo/kr/threat-encyclopedia/network/ddi-rule-5083
    DDI RULE 5072 ADRECON QUERY - LDAP(Request) Low
    2024/08/09DDI RULE 5072/vinfo/kr/threat-encyclopedia/network/ddi-rule-5072
    DDI RULE 5077 CVE-2024-2863 - LG LED Directory Traversal Exploit - HTTP (Request) High
    2024/08/05DDI RULE 5077/vinfo/kr/threat-encyclopedia/network/ddi-rule-5077
    DDI RULE 5078 CVE-2024-36991 - Splunk Directory Traversal Exploit - HTTP (Response) High
    2024/08/05DDI RULE 5078/vinfo/kr/threat-encyclopedia/network/ddi-rule-5078
    DDI RULE 5076 CVE-2024-4879 - ServiceNow Template Injection Exploit - HTTP (Response) High
    2024/08/01DDI RULE 5076/vinfo/kr/threat-encyclopedia/network/ddi-rule-5076
    DDI RULE 5074 CVE-2024-5015 - WHATSUP SSRF EXPLOIT - HTTP (REQUEST) High
    2024/08/01DDI RULE 5074/vinfo/kr/threat-encyclopedia/network/ddi-rule-5074
    DDI RULE 4886 TRUEBOT - HTTP (REQUEST) - Variant 2 High
    2024/07/31DDI RULE 4886/vinfo/kr/threat-encyclopedia/network/ddi-rule-4886
    DDI RULE 5073 CVE-2024-38112 - MSHTML RCE EXPLOIT - SMB2 (REQUEST) High
    2024/07/31DDI RULE 5073/vinfo/kr/threat-encyclopedia/network/ddi-rule-5073
    DDI RULE 5063 CVE-2024-5806 - MOVEit Authentication Bypass Exploit - HTTP(Request) High
    2024/07/29DDI RULE 5063/vinfo/kr/threat-encyclopedia/network/ddi-rule-5063
    DDI RULE 5067 CVE-2024-4358 - TELERIK AUTHBYPASS EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5067/vinfo/kr/threat-encyclopedia/network/ddi-rule-5067
    DDI RULE 5068 CVE-2024-37389 - APACHE NIFI EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5068/vinfo/kr/threat-encyclopedia/network/ddi-rule-5068
    DDI RULE 5069 PHP DEV EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5069/vinfo/kr/threat-encyclopedia/network/ddi-rule-5069
    DDI RULE 5070 CVE-2024-27348 - APACHE HUGEGRAPH RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5070/vinfo/kr/threat-encyclopedia/network/ddi-rule-5070
    DDI RULE 5071 RC4 Encryption in Pre-Authentication - Kerberos (Request) Medium
    2024/07/25DDI RULE 5071/vinfo/kr/threat-encyclopedia/network/ddi-rule-5071
    DDI RULE 5064 CVE-2024-38112 - MSHTML RCE EXPLOIT - HTTP (RESPONSE) High
    2024/07/24DDI RULE 5064/vinfo/kr/threat-encyclopedia/network/ddi-rule-5064
    DDI RULE 5065 CVE-2024-28995 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5065/vinfo/kr/threat-encyclopedia/network/ddi-rule-5065
    DDI RULE 5066 CVE-2024-4040 - CRUSHFTP RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5066/vinfo/kr/threat-encyclopedia/network/ddi-rule-5066
    DDI RULE 4682 MULTIPLE LATERAL MOVEMENT - SMB2(REQUEST) Low
    2024/07/23DDI RULE 4682/vinfo/kr/threat-encyclopedia/network/ddi-rule-4682
    DDI RULE 5052 CVE-2024-0769 - D-Link Directory Traversal Exploit - HTTP (Response) High
    2024/07/18DDI RULE 5052/vinfo/kr/threat-encyclopedia/network/ddi-rule-5052
    DDI RULE 5059 POSSIBLE KIMSUKY C2 - HTTP (Request) Medium
    2024/07/18DDI RULE 5059/vinfo/kr/threat-encyclopedia/network/ddi-rule-5059
    DDI RULE 5061 CVE-2024-21683 - Atlassian Confluence Server RCE Exploit - HTTP (Request) High
    2024/07/17DDI RULE 5061/vinfo/kr/threat-encyclopedia/network/ddi-rule-5061
    DDI RULE 5027 Telegram Bot API Sensor - HTTP (Response) Medium
    2024/07/16DDI RULE 5027/vinfo/kr/threat-encyclopedia/network/ddi-rule-5027
    DDI RULE 5062 CVE-2024-23692 - Rejetto HTTP File Server Command Injection Exploit - HTTP (Response) High
    2024/07/16DDI RULE 5062/vinfo/kr/threat-encyclopedia/network/ddi-rule-5062
    DDI RULE 5060 HNAP RCE EXPLOIT - HTTP (Request) High
    2024/07/16DDI RULE 5060/vinfo/kr/threat-encyclopedia/network/ddi-rule-5060
    DDI RULE 5057 PRIVATELOADER C2 - HTTP (Request) High
    2024/07/16DDI RULE 5057/vinfo/kr/threat-encyclopedia/network/ddi-rule-5057
    DDI RULE 5058 KOI LOADER C2 - HTTP (Request) High
    2024/07/15DDI RULE 5058/vinfo/kr/threat-encyclopedia/network/ddi-rule-5058
    DDI RULE 5053 HTA File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5053/vinfo/kr/threat-encyclopedia/network/ddi-rule-5053
    DDI RULE 5054 HTA File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5054/vinfo/kr/threat-encyclopedia/network/ddi-rule-5054
    DDI RULE 5055 SH File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5055/vinfo/kr/threat-encyclopedia/network/ddi-rule-5055
    DDI RULE 5056 SH File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5056/vinfo/kr/threat-encyclopedia/network/ddi-rule-5056
    DDI RULE 5047 CVE-2021-20837 - Movable Type XMLRPC Command Injection Exploit - HTTP (Response) High
    2024/07/11DDI RULE 5047/vinfo/kr/threat-encyclopedia/network/ddi-rule-5047
    DDI RULE 5050 ISO File Download Sensor - HTTP (Response) Low
    2024/07/11DDI RULE 5050/vinfo/kr/threat-encyclopedia/network/ddi-rule-5050
    DDI RULE 5049 APT - DARKPINK Exfiltration - SMTP (Request) Medium
    2024/07/10DDI RULE 5049/vinfo/kr/threat-encyclopedia/network/ddi-rule-5049
    DDI RULE 5051 AMADEY C2 - HTTP (Request) High
    2024/07/09DDI RULE 5051/vinfo/kr/threat-encyclopedia/network/ddi-rule-5051
    DDI RULE 4449 Remote Service execution through SMB2 SVCCTL detected - Variant 3 High
    2024/07/05DDI RULE 4449/vinfo/kr/threat-encyclopedia/network/ddi-rule-4449
    DDI RULE 5048 METASPLOIT (Payload) - Reverse HTTP Encrypted - HTTP (Response) Medium
    2024/07/03DDI RULE 5048/vinfo/kr/threat-encyclopedia/network/ddi-rule-5048
    DDI RULE 5046 Exfiltration SSH Private Key - HTTP (Response) High
    2024/06/24DDI RULE 5046/vinfo/kr/threat-encyclopedia/network/ddi-rule-5046
    DDI RULE 5044 CVE-2024-24919 - Check Point Information Disclosure Exploit - HTTP (Response) High
    2024/06/19DDI RULE 5044/vinfo/kr/threat-encyclopedia/network/ddi-rule-5044
    DDI RULE 5045 CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution - HTTP (Request) High
    2024/06/19DDI RULE 5045/vinfo/kr/threat-encyclopedia/network/ddi-rule-5045
    DDI RULE 5033 METASPLOIT (Payload) - Reverse TCP Encrypted - TCP (Response) Medium
    2024/06/13DDI RULE 5033/vinfo/kr/threat-encyclopedia/network/ddi-rule-5033
    DDI RULE 5043 Gomir C2 - HTTP (Request) High
    2024/06/04DDI RULE 5043/vinfo/kr/threat-encyclopedia/network/ddi-rule-5043
    DDI RULE 5042 CVE-2024-4956 - Nexus Repository 3 Path Traversal Exploit - HTTP (Response) High
    2024/05/30DDI RULE 5042/vinfo/kr/threat-encyclopedia/network/ddi-rule-5042
    DDI RULE 5035 JSOUTPROX - HTTP (REQUEST) High
    2024/05/29DDI RULE 5035/vinfo/kr/threat-encyclopedia/network/ddi-rule-5035
    DDI RULE 5037 CVE-2024-3272 - D-LINK NAS devices Hardcoded Credential Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5037/vinfo/kr/threat-encyclopedia/network/ddi-rule-5037
    DDI RULE 5038 CVE-2024-3273 - D-LINK NAS devices Command Injection Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5038/vinfo/kr/threat-encyclopedia/network/ddi-rule-5038
    DDI RULE 5039 SOAP API RCE - HTTP (Request) High
    2024/05/29DDI RULE 5039/vinfo/kr/threat-encyclopedia/network/ddi-rule-5039
    DDI RULE 5040 DLINK RCE - HTTP (Request) High
    2024/05/29DDI RULE 5040/vinfo/kr/threat-encyclopedia/network/ddi-rule-5040
    DDI RULE 5041 IDB EXFILTRATION - HTTP(REQUEST) High
    2024/05/29DDI RULE 5041/vinfo/kr/threat-encyclopedia/network/ddi-rule-5041
    DDI RULE 5034 TINYNUKE DOWNLOADER - HTTP (REQUEST) High
    2024/05/27DDI RULE 5034/vinfo/kr/threat-encyclopedia/network/ddi-rule-5034
    DDI RULE 5031 CVE-2022-30333 - RARLab UnRAR Directory Traversal Exploit - HTTP (Response) High
    2024/05/27DDI RULE 5031/vinfo/kr/threat-encyclopedia/network/ddi-rule-5031
    DDI RULE 5036 MELTED Hidden VNC - TCP (REQUEST) High
    2024/05/27DDI RULE 5036/vinfo/kr/threat-encyclopedia/network/ddi-rule-5036
    DDI RULE 5032 Copy BAT Files - SMB2 (Request) Low
    2024/05/21DDI RULE 5032/vinfo/kr/threat-encyclopedia/network/ddi-rule-5032
    DDI RULE 5030 MIMIC C2 - HTTP (Request) Medium
    2024/05/15DDI RULE 5030/vinfo/kr/threat-encyclopedia/network/ddi-rule-5030
    DDI RULE 4887 COBALTSTRIKE - HTTP (REQUEST) - Variant 4 High
    2024/05/09DDI RULE 4887/vinfo/kr/threat-encyclopedia/network/ddi-rule-4887
    DDI RULE 5028 EVILPROXY - HTTP (Response) High
    2024/05/07DDI RULE 5028/vinfo/kr/threat-encyclopedia/network/ddi-rule-5028
    DDI RULE 5024 CVE-2024-31138 - JetBrains TeamCity Cross-Site Scripting Exploit - HTTP (Request) High
    2024/05/06DDI RULE 5024/vinfo/kr/threat-encyclopedia/network/ddi-rule-5024
    DDI RULE 5025 CVE-2024-24401 - Nagios XI SQL Injection Exploit - HTTP (Response) High
    2024/05/06DDI RULE 5025/vinfo/kr/threat-encyclopedia/network/ddi-rule-5025
    DDI RULE 5026 POSSIBLE GOOTLOADER C2 - HTTP (Response) Medium
    2024/05/06DDI RULE 5026/vinfo/kr/threat-encyclopedia/network/ddi-rule-5026
    DDI RULE 5023 BATLOADER C2 - HTTP (Request) Medium
    2024/04/29DDI RULE 5023/vinfo/kr/threat-encyclopedia/network/ddi-rule-5023
    DDI RULE 5021 CVE-2023-48788 - FortiClientEMS SQL Injection Exploit - TCP (Request) High
    2024/04/18DDI RULE 5021/vinfo/kr/threat-encyclopedia/network/ddi-rule-5021
    DDI RULE 5022 CVE-2024-3400 - Palo Alto Command Injection Exploit - HTTP (Request) High
    2024/04/17DDI RULE 5022/vinfo/kr/threat-encyclopedia/network/ddi-rule-5022
    DDI RULE 5020 BUNNYLOADER - HTTP (REQUEST) High
    2024/04/15DDI RULE 5020/vinfo/kr/threat-encyclopedia/network/ddi-rule-5020
    DDI RULE 5017 CVE-2024-20767 - Cold Fusion Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5017/vinfo/kr/threat-encyclopedia/network/ddi-rule-5017
    DDI RULE 5018 CVE-2023-32315 - Ignite Realtime Openfire Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5018/vinfo/kr/threat-encyclopedia/network/ddi-rule-5018
    DDI RULE 5019 CVE-2023-42793 - Teamcity Server - HTTP(Response) High
    2024/04/08DDI RULE 5019/vinfo/kr/threat-encyclopedia/network/ddi-rule-5019
    DDI RULE 5016 Raccoon Stealer - HTTP (Request) High
    2024/04/02DDI RULE 5016/vinfo/kr/threat-encyclopedia/network/ddi-rule-5016
    DDI RULE 5015 COMEBACKER - HTTP (Request) High
    2024/04/01DDI RULE 5015/vinfo/kr/threat-encyclopedia/network/ddi-rule-5015
    DDI RULE 5014 APT - LOOKBACK - TCP (Request) High
    2024/03/25DDI RULE 5014/vinfo/kr/threat-encyclopedia/network/ddi-rule-5014
    DDI RULE 5013 Default GUID on External IP - SMB2 (Response) High
    2024/03/14DDI RULE 5013/vinfo/kr/threat-encyclopedia/network/ddi-rule-5013
    DDI RULE 5005 APT - LOOKBACK - TCP (Response) High
    2024/03/11DDI RULE 5005/vinfo/kr/threat-encyclopedia/network/ddi-rule-5005
    DDI RULE 5011 CVE-2024-27198 - JetBrains TeamCity Auth Bypass Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5011/vinfo/kr/threat-encyclopedia/network/ddi-rule-5011
    DDI RULE 5012 CVE-2024-27199 - JetBrains TeamCity Directory Traversal Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5012/vinfo/kr/threat-encyclopedia/network/ddi-rule-5012
    DDI RULE 5010 NTLM Challenge from External IP Address - SMB2 (Response) Medium
    2024/03/07DDI RULE 5010/vinfo/kr/threat-encyclopedia/network/ddi-rule-5010
    DDI RULE 4923 Splashtop Business Access Remote Desktop RMM - DNS (Response) Low
    2024/03/05DDI RULE 4923/vinfo/kr/threat-encyclopedia/network/ddi-rule-4923
    DDI RULE 4999 CVE-2023-48365 - Qlik HTTP Smuggling - HTTP (Response) Medium
    2024/02/27DDI RULE 4999/vinfo/kr/threat-encyclopedia/network/ddi-rule-4999
    DDI RULE 5001 TeamViewer RMM - UDP (Request) Medium
    2024/02/26DDI RULE 5001/vinfo/kr/threat-encyclopedia/network/ddi-rule-5001
    DDI RULE 5002 TeamViewer RMM - DNS (Response) Medium
    2024/02/26DDI RULE 5002/vinfo/kr/threat-encyclopedia/network/ddi-rule-5002
    DDI RULE 5008 CVE-2023-41265 - QLIK Request Tunneling Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5008/vinfo/kr/threat-encyclopedia/network/ddi-rule-5008
    DDI RULE 5009 CVE-2023-41266 - QLIK Directory Traversal Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5009/vinfo/kr/threat-encyclopedia/network/ddi-rule-5009
    DDI RULE 5006 CVE-2024-1708 - ConnectWise ScreenConnect Directory Traversal Exploit - HTTP (Request) High
    2024/02/23DDI RULE 5006/vinfo/kr/threat-encyclopedia/network/ddi-rule-5006
    DDI RULE 5007 CVE-2024-1709 - ConnectWise ScreenConnect Authentication Bypass Exploit - HTTP (Response) High
    2024/02/23DDI RULE 5007/vinfo/kr/threat-encyclopedia/network/ddi-rule-5007
    DDI RULE 5003 CVE-2024-22024 - Ivanti Connect Secure & Policy Secure Authentication Bypass Exploit - HTTP (Request) High
    2024/02/22DDI RULE 5003/vinfo/kr/threat-encyclopedia/network/ddi-rule-5003
    DDI RULE 5004 SuperOps RMM Sensor - DNS (Response) Low
    2024/02/22DDI RULE 5004/vinfo/kr/threat-encyclopedia/network/ddi-rule-5004
    DDI RULE 4996 CVE-2024-21893 - Ivanti Connect Secure & Policy Secure Gateways Server-Side Request Forgery Exploit - HTTP (Request) High
    2024/02/19DDI RULE 4996/vinfo/kr/threat-encyclopedia/network/ddi-rule-4996
    DDI RULE 4998 DARKME - TCP (Request) High
    2024/02/15DDI RULE 4998/vinfo/kr/threat-encyclopedia/network/ddi-rule-4998
    DDI RULE 5000 GhostLocker Exfiltration - HTTP (Request) High
    2024/02/15DDI RULE 5000/vinfo/kr/threat-encyclopedia/network/ddi-rule-5000
    DDI RULE 4995 CVE-2023-46805 - Ivanti Connect Secure & Policy Secure Gateways Authentication Bypass Exploit - HTTP (Response) High
    2024/02/12DDI RULE 4995/vinfo/kr/threat-encyclopedia/network/ddi-rule-4995
    DDI RULE 4997 CVE-2024-23897 - Jenkins Authentication Bypass Exploit - HTTP (Request) High
    2024/02/12DDI RULE 4997/vinfo/kr/threat-encyclopedia/network/ddi-rule-4997
    DDI RULE 4994 CVE-2024-0204 - Fortra GoAnywhere MFT AuthBypass Exploit - HTTP(Request) High
    2024/02/01DDI RULE 4994/vinfo/kr/threat-encyclopedia/network/ddi-rule-4994
    DDI RULE 4992 CVE-2023-32252 - Linux Kernel ksmbd NULL Pointer Exploit - SMB2 (Request) High
    2024/01/31DDI RULE 4992/vinfo/kr/threat-encyclopedia/network/ddi-rule-4992
    DDI RULE 4973 Possible Encryption Downgrade Attack - Kerberos (Response) Medium
    2024/01/31DDI RULE 4973/vinfo/kr/threat-encyclopedia/network/ddi-rule-4973
    DDI RULE 4993 MAGIC HOUND SOAP - HTTP(Request) High
    2024/01/29DDI RULE 4993/vinfo/kr/threat-encyclopedia/network/ddi-rule-4993
    DDI RULE 4991 PIKABOT EXFIL - HTTP (Request) High
    2024/01/29DDI RULE 4991/vinfo/kr/threat-encyclopedia/network/ddi-rule-4991
    DDI RULE 4986 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Response) Medium
    2024/01/29DDI RULE 4986/vinfo/kr/threat-encyclopedia/network/ddi-rule-4986
    DDI RULE 4990 CVE-2023-22527 - Atlassian OGNL Injection Exploit - HTTP (Request) High
    2024/01/25DDI RULE 4990/vinfo/kr/threat-encyclopedia/network/ddi-rule-4990
    DDI RULE 4974 HAVOC - HTTP (Request) High
    2024/01/25DDI RULE 4974/vinfo/kr/threat-encyclopedia/network/ddi-rule-4974
    DDI RULE 4987 TPRC - HTTP (Request) High
    2024/01/24DDI RULE 4987/vinfo/kr/threat-encyclopedia/network/ddi-rule-4987
    DDI RULE 4988 CVE-2023-46805 - Ivanti Connect Secure and Policy Secure Gateways Authentication Bypass Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4988/vinfo/kr/threat-encyclopedia/network/ddi-rule-4988
    DDI RULE 4989 CVE-2024-21887 - Ivanti Connect Secure and Policy Secure Gateways Command Injection Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4989/vinfo/kr/threat-encyclopedia/network/ddi-rule-4989
    DDI RULE 4859 ZIP TLD MOVED - HTTP(RESPONSE) High
    2024/01/23DDI RULE 4859/vinfo/kr/threat-encyclopedia/network/ddi-rule-4859
    DDI RULE 4984 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP (REQUEST) - Variant 2 High
    2024/01/22DDI RULE 4984/vinfo/kr/threat-encyclopedia/network/ddi-rule-4984
    DDI RULE 4985 CVE-2023-46604 - Apache ActiveMQ RCE Exploit - TCP (Request) High
    2024/01/22DDI RULE 4985/vinfo/kr/threat-encyclopedia/network/ddi-rule-4985
    DDI RULE 4983 Micosoft Windows SmartScreen Exploit(ZDI-CAN-23100) - HTTP(Response) High
    2024/01/18DDI RULE 4983/vinfo/kr/threat-encyclopedia/network/ddi-rule-4983
    DDI RULE 4982 COPY FILES - SMB2(REQUEST) High
    2024/01/16DDI RULE 4982/vinfo/kr/threat-encyclopedia/network/ddi-rule-4982
    DDI RULE 4975 CVE-2023-51467- Apache OFBiz Pre-Auth RCE Exploit - HTTP (Response) High
    2024/01/11DDI RULE 4975/vinfo/kr/threat-encyclopedia/network/ddi-rule-4975
    DDI RULE 4976 SYSTEM INFORMATION DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4976/vinfo/kr/threat-encyclopedia/network/ddi-rule-4976
    DDI RULE 4977 TRUSTED DOMAIN DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4977/vinfo/kr/threat-encyclopedia/network/ddi-rule-4977
    DDI RULE 4978 PASSWORD POLICY DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4978/vinfo/kr/threat-encyclopedia/network/ddi-rule-4978
    DDI RULE 4979 PERMISSION GROUP DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4979/vinfo/kr/threat-encyclopedia/network/ddi-rule-4979
    DDI RULE 4980 SYSTEM OWNER DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4980/vinfo/kr/threat-encyclopedia/network/ddi-rule-4980
    DDI RULE 4981 ACCOUNT DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4981/vinfo/kr/threat-encyclopedia/network/ddi-rule-4981
    DDI RULE 4972 PIKABOT DLL Dropper - HTTP (Request) Medium
    2024/01/10DDI RULE 4972/vinfo/kr/threat-encyclopedia/network/ddi-rule-4972
    DDI RULE 4968 Remcos - TCP Medium
    2024/01/03DDI RULE 4968/vinfo/kr/threat-encyclopedia/network/ddi-rule-4968
    DDI RULE 4969 Fonelab - Certificate - HTTPS Medium
    2024/01/03DDI RULE 4969/vinfo/kr/threat-encyclopedia/network/ddi-rule-4969
    DDI RULE 4970 CVE-2021-20016 - SonicWall SSLVPN SMA100 SQL Injection Exploit - HTTP (Request) High
    2024/01/03DDI RULE 4970/vinfo/kr/threat-encyclopedia/network/ddi-rule-4970
    DDI RULE 4971 APT CONN - UDP(REQUEST) High
    2024/01/02DDI RULE 4971/vinfo/kr/threat-encyclopedia/network/ddi-rule-4971
    DDI RULE 4928 CVE-2023-2914 - Rockwell Automation ThinManager ThinServer Type 13 Synchronization Integer Overflow Exploit - TCP (Request) High
    2023/12/21DDI RULE 4928/vinfo/kr/threat-encyclopedia/network/ddi-rule-4928
    DDI RULE 4967 CVE-2023-50164 - Apace Struts2 Path Traversal Exploit - HTTP (Request) High
    2023/12/19DDI RULE 4967/vinfo/kr/threat-encyclopedia/network/ddi-rule-4967
    DDI RULE 4965 LVRAN - HTTP (Request) High
    2023/12/18DDI RULE 4965/vinfo/kr/threat-encyclopedia/network/ddi-rule-4965
    DDI RULE 4966 BIGIP TMSH Path Exploit - HTTP (Response) Medium
    2023/12/14DDI RULE 4966/vinfo/kr/threat-encyclopedia/network/ddi-rule-4966
    DDI RULE 4962 BRUTEFORCE - SMB(RESPONSE) High
    2023/12/12DDI RULE 4962/vinfo/kr/threat-encyclopedia/network/ddi-rule-4962
    DDI RULE 4949 CVE-2023-46747 - BIGIP Smug Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4949/vinfo/kr/threat-encyclopedia/network/ddi-rule-4949
    DDI RULE 4964 CVE-2023-49070 - Apache OFBiz Pre-Auth RCE Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4964/vinfo/kr/threat-encyclopedia/network/ddi-rule-4964
    DDI RULE 4963 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP(REQUEST) High
    2023/12/11DDI RULE 4963/vinfo/kr/threat-encyclopedia/network/ddi-rule-4963
    DDI RULE 4958 POSSIBLE TUNNELING - DNS (Response) - Variant 2 Low
    2023/12/05DDI RULE 4958/vinfo/kr/threat-encyclopedia/network/ddi-rule-4958
    DDI RULE 4959 COBEACON C2 - HTTP(RESPONSE) Medium
    2023/12/05DDI RULE 4959/vinfo/kr/threat-encyclopedia/network/ddi-rule-4959
    DDI RULE 4961 TRAMPIKABOT - HTTP(REQUEST) High
    2023/12/05DDI RULE 4961/vinfo/kr/threat-encyclopedia/network/ddi-rule-4961
    DDI RULE 4960 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Request) Medium
    2023/11/30DDI RULE 4960/vinfo/kr/threat-encyclopedia/network/ddi-rule-4960
    DDI RULE 4930 RHYSIDA - SMB2 (Request) High
    2023/11/30DDI RULE 4930/vinfo/kr/threat-encyclopedia/network/ddi-rule-4930
    DDI RULE 4956 CVE-2023-47246 - SYSAID TRAVERSAL EXPLOIT - HTTP (Request) High
    2023/11/22DDI RULE 4956/vinfo/kr/threat-encyclopedia/network/ddi-rule-4956
    DDI RULE 4957 CVE-2023-4634 - Wordpress Plugin Media-Library-Assistant RCE Exploit - HTTP (Request) High
    2023/11/22DDI RULE 4957/vinfo/kr/threat-encyclopedia/network/ddi-rule-4957
    DDI RULE 4894 CVE-2023-28771 - Zyxel RCE Exploit - UDP (Request) High
    2023/11/21DDI RULE 4894/vinfo/kr/threat-encyclopedia/network/ddi-rule-4894
    DDI RULE 4879 Possible CVE-2021-27876 - Veritas RCE Exploit - TCP (Response) Low
    2023/11/21DDI RULE 4879/vinfo/kr/threat-encyclopedia/network/ddi-rule-4879
    DDI RULE 4954 CVE-2022-42475 - Fortinet FortiOS SSL-VPN Buffer Overflow Exploit - HTTP (Request) High
    2023/11/20DDI RULE 4954/vinfo/kr/threat-encyclopedia/network/ddi-rule-4954
    DDI RULE 4955 PIKABOT - Malicious Certificate - HTTPS High
    2023/11/20DDI RULE 4955/vinfo/kr/threat-encyclopedia/network/ddi-rule-4955
    DDI RULE 4952 APT CONN - TCP(REQUEST) High
    2023/11/20DDI RULE 4952/vinfo/kr/threat-encyclopedia/network/ddi-rule-4952
    DDI RULE 4953 CVE-2023-20198 - Cisco IOS XE WebUI Authentication Bypass Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4953/vinfo/kr/threat-encyclopedia/network/ddi-rule-4953
    DDI RULE 4935 ANOMALIES - HTTP(REQUEST) Medium
    2023/11/16DDI RULE 4935/vinfo/kr/threat-encyclopedia/network/ddi-rule-4935
    DDI RULE 4942 CVE-2023-4966 - NetScaler ADC and Gateway Buffer Overflow Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4942/vinfo/kr/threat-encyclopedia/network/ddi-rule-4942
    DDI RULE 4944 CVE-2023-28288 - MS Sharepoint Information Disclosure Exploit - HTTP(Request) High
    2023/11/16DDI RULE 4944/vinfo/kr/threat-encyclopedia/network/ddi-rule-4944
    DDI RULE 4947 GOOTLOADER XMLRPC - HTTP (Request) High
    2023/11/16DDI RULE 4947/vinfo/kr/threat-encyclopedia/network/ddi-rule-4947
    DDI RULE 4946 SQL Injection Exploit Sensor - HTTP (Request) Medium
    2023/11/14DDI RULE 4946/vinfo/kr/threat-encyclopedia/network/ddi-rule-4946
    DDI RULE 4936 CVE-2023-29516 - XWIKI RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4936/vinfo/kr/threat-encyclopedia/network/ddi-rule-4936
    DDI RULE 4937 CVE-2023-37462 - XWIKI RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4937/vinfo/kr/threat-encyclopedia/network/ddi-rule-4937
    DDI RULE 4913 CVE-2023-40044 - WS FTP RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4913/vinfo/kr/threat-encyclopedia/network/ddi-rule-4913
    DDI RULE 4951 TURLA - HTTP(REQUEST) High
    2023/11/14DDI RULE 4951/vinfo/kr/threat-encyclopedia/network/ddi-rule-4951
    DDI RULE 4950 CVE-2023-20273 - Cisco IOS XE WebUI RCE Exploit - HTTP (Request) High
    2023/11/13DDI RULE 4950/vinfo/kr/threat-encyclopedia/network/ddi-rule-4950
    DDI RULE 4931 Cisco IOS XE Vulnerability Implant Detection Exploit - HTTP (Response) High
    2023/11/13DDI RULE 4931/vinfo/kr/threat-encyclopedia/network/ddi-rule-4931
    DDI RULE 4948 CVE-2023-36745 - MS Exchange Powershell RCE EXPLOIT - HTTP (Request) High
    2023/11/13DDI RULE 4948/vinfo/kr/threat-encyclopedia/network/ddi-rule-4948
    DDI RULE 4941 CVE-2023-22518 - Confluence Improper Authorization Vulnerability Exploit - HTTP (Request) High
    2023/11/10DDI RULE 4941/vinfo/kr/threat-encyclopedia/network/ddi-rule-4941
    DDI RULE 4945 Confluence Improper Authorization Vulnerability Exploit Sensor - HTTP (Response) Medium
    2023/11/10DDI RULE 4945/vinfo/kr/threat-encyclopedia/network/ddi-rule-4945
    DDI RULE 4943 CVE-2023-38545 - Libcurl Exploit - HTTP(Response) High
    2023/11/10DDI RULE 4943/vinfo/kr/threat-encyclopedia/network/ddi-rule-4943
    DDI RULE 4940 APT URL - HTTP(REQUEST) High
    2023/11/09DDI RULE 4940/vinfo/kr/threat-encyclopedia/network/ddi-rule-4940
    DDI RULE 4938 APT DOMAINS - DNS(RESPONSE) High
    2023/11/08DDI RULE 4938/vinfo/kr/threat-encyclopedia/network/ddi-rule-4938
    DDI RULE 4904 PRIVATE LOADER STATUS - HTTP (Request) High
    2023/11/08DDI RULE 4904/vinfo/kr/threat-encyclopedia/network/ddi-rule-4904
    DDI RULE 4932 CVE-2023-44414 - DLINK RCE EXPLOIT - HTTP(REQUEST) High
    2023/10/31DDI RULE 4932/vinfo/kr/threat-encyclopedia/network/ddi-rule-4932
    DDI RULE 4933 CVE-2023-42117 - Exim RCE EXPLOIT - SMTP(Request) High
    2023/10/26DDI RULE 4933/vinfo/kr/threat-encyclopedia/network/ddi-rule-4933
    DDI RULE 4934 CVE-2023-22515 - Atlassian Confluence Data Center Broken Access Control Exploit - HTTP (Request) High
    2023/10/26DDI RULE 4934/vinfo/kr/threat-encyclopedia/network/ddi-rule-4934
    DDI RULE 4922 CVE-2023-38831 - WINRAR POE EXPLOIT - HTTP (Response) High
    2023/10/25DDI RULE 4922/vinfo/kr/threat-encyclopedia/network/ddi-rule-4922
    DDI RULE 4929 CVE-2023-2917 - Rockwell Automation ThinManager ThinServer Type 38 Synchronization Message Directory Traversal Exploit - TCP (Request) High
    2023/10/25DDI RULE 4929/vinfo/kr/threat-encyclopedia/network/ddi-rule-4929
    DDI RULE 4814 CVE-2022-41080 - MS Exchange Server Outlook Web Access Exploit - HTTP(Request) Low
    2023/10/25DDI RULE 4814/vinfo/kr/threat-encyclopedia/network/ddi-rule-4814
    DDI RULE 4927 CVE-2023-0210 - Linux Kernel ksmbd Integer Underflow Exploit - SMB2 (Request) High
    2023/10/24DDI RULE 4927/vinfo/kr/threat-encyclopedia/network/ddi-rule-4927
    DDI RULE 4918 CVE-2023-29525 - XWiki LegacyNotificationAdministration Code Injection Exploit - HTTP (Request) High
    2023/10/24DDI RULE 4918/vinfo/kr/threat-encyclopedia/network/ddi-rule-4918
    DDI RULE 4916 CVE-2022-27255 - SIP BUFFEROVERFLOW EXPLOIT - ICMP(REQUEST) High
    2023/10/23DDI RULE 4916/vinfo/kr/threat-encyclopedia/network/ddi-rule-4916
    DDI RULE 4926 CVE-2023-39361 - Cacti Group Cacti graph_view.php SQL Injection Exploit - HTTP (Request) High
    2023/10/23DDI RULE 4926/vinfo/kr/threat-encyclopedia/network/ddi-rule-4926
    DDI RULE 4924 Linux Kernel ksmbd NULL Pointer Exploit - SMB2(Request) High
    2023/10/23DDI RULE 4924/vinfo/kr/threat-encyclopedia/network/ddi-rule-4924
    DDI RULE 4925 LUMMAC2SOCK - HTTP (Request) High
    2023/10/19DDI RULE 4925/vinfo/kr/threat-encyclopedia/network/ddi-rule-4925
    DDI RULE 4920 LUMMAC2CONF - HTTP (Request) High
    2023/10/19DDI RULE 4920/vinfo/kr/threat-encyclopedia/network/ddi-rule-4920
    DDI RULE 4921 DARKGATE - HTTP (Request) High
    2023/10/19DDI RULE 4921/vinfo/kr/threat-encyclopedia/network/ddi-rule-4921
    DDI RULE 4919 CVE-2023-24488 - Citrix Gateway Open Redirect and XSS Exploit - HTTP (Request) High
    2023/10/18DDI RULE 4919/vinfo/kr/threat-encyclopedia/network/ddi-rule-4919
    DDI RULE 4914 CVE-2023-35166 - XWiKi RCE Exploit - HTTP (Request) High
    2023/10/17DDI RULE 4914/vinfo/kr/threat-encyclopedia/network/ddi-rule-4914
    DDI RULE 4911 CVE-2023-32563 - Ivanti Avalanche Directory Traversal Exploit - HTTP(Request) High
    2023/10/17DDI RULE 4911/vinfo/kr/threat-encyclopedia/network/ddi-rule-4911
    DDI RULE 4912 Possible Overpass-The-Hash Technique - Kerberos (Request) High
    2023/10/17DDI RULE 4912/vinfo/kr/threat-encyclopedia/network/ddi-rule-4912
    DDI RULE 4915 CVE-2023-42121 - CONTROLWEBPANEL RCE EXPLOIT - HTTP(REQUEST) High
    2023/10/11DDI RULE 4915/vinfo/kr/threat-encyclopedia/network/ddi-rule-4915
    DDI RULE 4909 BUMBLELOADER Exfil - HTTP (Response) High
    2023/10/10DDI RULE 4909/vinfo/kr/threat-encyclopedia/network/ddi-rule-4909
    DDI RULE 4910 CVE-2023-20890 - VMware Aria Operations Directory Traversal Exploit - HTTP (Request) High
    2023/10/09DDI RULE 4910/vinfo/kr/threat-encyclopedia/network/ddi-rule-4910
    DDI RULE 4908 BUMBLE LOADER FALCON - DNS (Request) Medium
    2023/10/05DDI RULE 4908/vinfo/kr/threat-encyclopedia/network/ddi-rule-4908
    DDI RULE 4906 CVE-2023-38126 - Softing edgeAggregator Restore Configuration Directory Traversal Exploit - HTTPS (Request) High
    2023/10/04DDI RULE 4906/vinfo/kr/threat-encyclopedia/network/ddi-rule-4906
    DDI RULE 4907 CVE-2023-39750 - D-Link DAP-2660 Buffer Overflow Exploit - HTTP (Request) High
    2023/10/04DDI RULE 4907/vinfo/kr/threat-encyclopedia/network/ddi-rule-4907
    DDI RULE 4905 CVE-2023-4711 - DLink RCE Exploit - HTTP (Request) High
    2023/10/02DDI RULE 4905/vinfo/kr/threat-encyclopedia/network/ddi-rule-4905
    DDI RULE 4901 CVE-2023-28651 - Contec CONPROSYS HMI System XSS Exploit - HTTP (Request) High
    2023/10/02DDI RULE 4901/vinfo/kr/threat-encyclopedia/network/ddi-rule-4901
    DDI RULE 4903 CVE-2023-36932 - MOVEit Transfer FolderListRecursive SQL Injection Exploit - HTTPS (Request) High
    2023/10/02DDI RULE 4903/vinfo/kr/threat-encyclopedia/network/ddi-rule-4903
    DDI RULE 4900 CVE-2023-32165 - D-Link D-View Directory Traversal Exploit - TFTP (Request) High
    2023/09/28DDI RULE 4900/vinfo/kr/threat-encyclopedia/network/ddi-rule-4900
    DDI RULE 4898 A normal user attempted to log on to the POSTGRES service Low
    2023/09/28DDI RULE 4898/vinfo/kr/threat-encyclopedia/network/ddi-rule-4898
    DDI RULE 4899 CVE-2023-38204 - Adobe ColdFusion RCE Exploit - HTTP (Request) High
    2023/09/28DDI RULE 4899/vinfo/kr/threat-encyclopedia/network/ddi-rule-4899
    DDI RULE 4902 QAKBOT - HTTP (REQUEST) - Variant 9 High
    2023/09/26DDI RULE 4902/vinfo/kr/threat-encyclopedia/network/ddi-rule-4902
    DDI RULE 4893 CVE-2023-20887 - VREALIZE SHELL INJECT EXPLOIT - HTTP (Request) High
    2023/09/25DDI RULE 4893/vinfo/kr/threat-encyclopedia/network/ddi-rule-4893
    DDI RULE 4897 CVE-2023-34127 - SonicWall Command Injection Exploit - HTTP (Request) High
    2023/09/25DDI RULE 4897/vinfo/kr/threat-encyclopedia/network/ddi-rule-4897
    DDI RULE 4889 COBEACON - Malicious Certificate - HTTPS High
    2023/09/25DDI RULE 4889/vinfo/kr/threat-encyclopedia/network/ddi-rule-4889
    DDI RULE 4895 NDMP FILEWRITE - TCP(REQUEST) Low
    2023/09/21DDI RULE 4895/vinfo/kr/threat-encyclopedia/network/ddi-rule-4895
    DDI RULE 4896 NDMP EXECUTE COMMAND - TCP(REQUEST) Low
    2023/09/21DDI RULE 4896/vinfo/kr/threat-encyclopedia/network/ddi-rule-4896
    DDI RULE 4892 APT - COBEACON ENC - HTTP (Request) Low
    2023/09/21DDI RULE 4892/vinfo/kr/threat-encyclopedia/network/ddi-rule-4892
    DDI RULE 4890 Msgbot Exfilt - HTTP (Request) Medium
    2023/09/20DDI RULE 4890/vinfo/kr/threat-encyclopedia/network/ddi-rule-4890
    DDI RULE 4891 CVE-2023-32071 - XWIKI XSS RCE Exploit- HTTP (Request) High
    2023/09/20DDI RULE 4891/vinfo/kr/threat-encyclopedia/network/ddi-rule-4891
    DDI RULE 4881 CVE-2023-34133 - SonicWall SQL Injection Exploit - HTTP (Request) High
    2023/09/18DDI RULE 4881/vinfo/kr/threat-encyclopedia/network/ddi-rule-4881
    DDI RULE 4882 CVE-2023-38099 - NetGear SQL Injection Exploit - HTTP (Request) High
    2023/09/14DDI RULE 4882/vinfo/kr/threat-encyclopedia/network/ddi-rule-4882
    DDI RULE 4885 CVE-2023-25717 - Ruckus RCE Exploit - HTTP (Request) High
    2023/09/14DDI RULE 4885/vinfo/kr/threat-encyclopedia/network/ddi-rule-4885
    DDI RULE 4888 CVE-2023-38148 - DHCP BUFFER OVERFLOW EXPLOIT - UDP(REQUEST) High
    2023/09/13DDI RULE 4888/vinfo/kr/threat-encyclopedia/network/ddi-rule-4888
    DDI RULE 4883 CVE-2023-24489 - Citrix ShareFile Directory Traversal Exploit - HTTP (Request) High
    2023/09/13DDI RULE 4883/vinfo/kr/threat-encyclopedia/network/ddi-rule-4883
    DDI RULE 4884 CVE-2023-32560 - Ivanti Avalanche WLAvalancheService Stack Buffer Overflow RCE Exploit - TCP (Request) High
    2023/09/13DDI RULE 4884/vinfo/kr/threat-encyclopedia/network/ddi-rule-4884
    DDI RULE 4880 CVE-2023-3519 - CITRIX OVERFLOW EXPLOIT - HTTP (Request) High
    2023/09/12DDI RULE 4880/vinfo/kr/threat-encyclopedia/network/ddi-rule-4880
    DDI RULE 4877 CVE-2023-33246 - Apache RocketMQ RCE Exploit - TCP (Request) High
    2023/09/07DDI RULE 4877/vinfo/kr/threat-encyclopedia/network/ddi-rule-4877
    DDI RULE 4878 CVE-2023-35150 - XWIKI RCE Exploit - HTTP (Request) High
    2023/09/07DDI RULE 4878/vinfo/kr/threat-encyclopedia/network/ddi-rule-4878
    DDI RULE 4874 TOOL BITSADMIN POST - HTTP(REQUEST) Low
    2023/09/04DDI RULE 4874/vinfo/kr/threat-encyclopedia/network/ddi-rule-4874
    DDI RULE 4876 CVE-2023-35078 - Ivanti Endpoint - HTTP (Response) High
    2023/08/31DDI RULE 4876/vinfo/kr/threat-encyclopedia/network/ddi-rule-4876
    DDI RULE 4875 CVE-2023-39475 - Ingnition Deserialization Remote Code Execution Exploit - HTTP(Request) High
    2023/08/30DDI RULE 4875/vinfo/kr/threat-encyclopedia/network/ddi-rule-4875
    DDI RULE 4794 CVE-2022-3602 - OpenSSL Buffer Overflow Exploit - TLS (Response) High
    2023/08/23DDI RULE 4794/vinfo/kr/threat-encyclopedia/network/ddi-rule-4794
    DDI RULE 4873 APT - PUBLOAD - HTTP (Request) High
    2023/08/15DDI RULE 4873/vinfo/kr/threat-encyclopedia/network/ddi-rule-4873
    DDI RULE 4872 ICEDID JAVASCRIPT DROPPER - HTTP(Request) High
    2023/08/09DDI RULE 4872/vinfo/kr/threat-encyclopedia/network/ddi-rule-4872
    DDI RULE 4870 COBEACON DEFAULT NAMED PIPE - SMB2 (Request) Low
    2023/08/08DDI RULE 4870/vinfo/kr/threat-encyclopedia/network/ddi-rule-4870
    DDI RULE 4871 CVE-2021-27860 - VOLTTYPHOON EXPLOIT - HTTP(Request) High
    2023/08/07DDI RULE 4871/vinfo/kr/threat-encyclopedia/network/ddi-rule-4871
    DDI RULE 4804 CVE-2022-4223 - PGADMIN RCE EXPLOIT - HTTP(REQUEST) High
    2023/08/03DDI RULE 4804/vinfo/kr/threat-encyclopedia/network/ddi-rule-4804
    DDI RULE 2466 Accessed non-existing administrative share - SMB Low
    2023/07/31DDI RULE 2466/vinfo/kr/threat-encyclopedia/network/ddi-rule-2466
    DDI RULE 4869 CVE-2023-29357 - SHAREPOINT PRIVILEGE ESCALATION - HTTP (REQUEST) - Variant 2 High
    2023/07/25DDI RULE 4869/vinfo/kr/threat-encyclopedia/network/ddi-rule-4869
    DDI RULE 4868 CVE-2023-33157 - SHAREPOINT RCE EXPLOIT - HTTP(REQUEST) High
    2023/07/17DDI RULE 4868/vinfo/kr/threat-encyclopedia/network/ddi-rule-4868
    DDI RULE 4860 COBEACON - DNS (Response) - Variant 2 Medium
    2023/07/13DDI RULE 4860/vinfo/kr/threat-encyclopedia/network/ddi-rule-4860
    DDI RULE 4867 CVE-2023-36934 - MOVEIT SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2023/07/06DDI RULE 4867/vinfo/kr/threat-encyclopedia/network/ddi-rule-4867
    DDI RULE 4866 CVE-2023-29357 - SHAREPOINT PRIVILEGE ESCALATION - HTTP(REQUEST) High
    2023/07/04DDI RULE 4866/vinfo/kr/threat-encyclopedia/network/ddi-rule-4866
    DDI RULE 4863 CVE-2023-25690 - APACHE HTTP Server Request Smuggling Exploit - HTTP (Request) Medium
    2023/07/04DDI RULE 4863/vinfo/kr/threat-encyclopedia/network/ddi-rule-4863
    DDI RULE 4865 CVE-2023-35708 - MOVEIT SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2023/06/22DDI RULE 4865/vinfo/kr/threat-encyclopedia/network/ddi-rule-4865
    DDI RULE 4864 CVE-2023-35036 - MOVEIT CERT SQL INJECTION - HTTP(REQUEST) High
    2023/06/21DDI RULE 4864/vinfo/kr/threat-encyclopedia/network/ddi-rule-4864
    DDI RULE 4862 CVE-2023-27997 - Fortinet FortiGate Buffer Overflow Exploit- HTTP (Request) High
    2023/06/21DDI RULE 4862/vinfo/kr/threat-encyclopedia/network/ddi-rule-4862
    DDI RULE 4858 SLIVER - HTTP (Request) Medium
    2023/06/14DDI RULE 4858/vinfo/kr/threat-encyclopedia/network/ddi-rule-4858
    DDI RULE 4856 CVE-2023-34362 - MOVEIT SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2023/06/08DDI RULE 4856/vinfo/kr/threat-encyclopedia/network/ddi-rule-4856
    DDI RULE 4854 SILOCK WEBSHELL - HTTP(REQUEST) High
    2023/06/05DDI RULE 4854/vinfo/kr/threat-encyclopedia/network/ddi-rule-4854
    DDI RULE 4855 REDLINE EXFIL - TCP(REQUEST) High
    2023/06/05DDI RULE 4855/vinfo/kr/threat-encyclopedia/network/ddi-rule-4855
    DDI RULE 4851 CVE-2022-27924 - ZIMBRA EXPLOIT - HTTP (Request) High
    2023/06/05DDI RULE 4851/vinfo/kr/threat-encyclopedia/network/ddi-rule-4851
    DDI RULE 4853 ICEDID EXFIL - HTTP(REQUEST) High
    2023/06/01DDI RULE 4853/vinfo/kr/threat-encyclopedia/network/ddi-rule-4853
    DDI RULE 4852 CVE-2023-21554 - WINDOWS MQ SERVICE RCE - TCP(REQUEST) High
    2023/05/31DDI RULE 4852/vinfo/kr/threat-encyclopedia/network/ddi-rule-4852
    DDI RULE 4850 PsExec - SMB2 (Request) Medium
    2023/05/27DDI RULE 4850/vinfo/kr/threat-encyclopedia/network/ddi-rule-4850
    DDI RULE 4849 CVE-2023-1671 - Sophos Web Appliance Command Injection Exploit - HTTP (Request) High
    2023/05/25DDI RULE 4849/vinfo/kr/threat-encyclopedia/network/ddi-rule-4849
    DDI RULE 4847 CVE-2022-36067 - VM2 REMOTE CODE EXECUTION - HTTP(REQUEST) High
    2023/05/22DDI RULE 4847/vinfo/kr/threat-encyclopedia/network/ddi-rule-4847
    DDI RULE 4848 LOCKBIT EXFIL - HTTP(REQUEST) High
    2023/05/22DDI RULE 4848/vinfo/kr/threat-encyclopedia/network/ddi-rule-4848
    DDI RULE 4843 CVE-2023-32521 - TMMS UNAUTHENTICATED TRAVERSAL EXPLOIT - HTTP (Request) High
    2023/05/18DDI RULE 4843/vinfo/kr/threat-encyclopedia/network/ddi-rule-4843
    DDI RULE 4844 CVE-2023-32522 - TMMS AUTHENTICATED TRAVERSAL EXPLOIT - HTTP (Request) High
    2023/05/18DDI RULE 4844/vinfo/kr/threat-encyclopedia/network/ddi-rule-4844
    DDI RULE 4845 TMMS FILE DISCLOSURE EXPLOIT - HTTP (Request) High
    2023/05/18DDI RULE 4845/vinfo/kr/threat-encyclopedia/network/ddi-rule-4845
    DDI RULE 4839 CVE-2023-1389 - TPLink Firmware Command Injection Exploit - HTTP (Request) Medium
    2023/05/17DDI RULE 4839/vinfo/kr/threat-encyclopedia/network/ddi-rule-4839
    DDI RULE 4819 Possible Traffic Signaling - TCP (Request) High
    2023/05/17DDI RULE 4819/vinfo/kr/threat-encyclopedia/network/ddi-rule-4819
    DDI RULE 4820 Traffic with Base64 Encode - TCP (Request) High
    2023/05/17DDI RULE 4820/vinfo/kr/threat-encyclopedia/network/ddi-rule-4820
    DDI RULE 4846 CVE-2023-24941 - WINDOWS NETWORK FILE SYSTEM RCE EXPLOIT - TCP(REQUEST) High
    2023/05/15DDI RULE 4846/vinfo/kr/threat-encyclopedia/network/ddi-rule-4846
    DDI RULE 4821 Authentication Required - HTTP (Response) Low
    2023/05/10DDI RULE 4821/vinfo/kr/threat-encyclopedia/network/ddi-rule-4821
    DDI RULE 4842 CVE-2023-24950 - MICROSOFT SHAREPOINT RCE EXPLOIT - HTTP(REQUEST) High
    2023/05/08DDI RULE 4842/vinfo/kr/threat-encyclopedia/network/ddi-rule-4842
    DDI RULE 4840 CVE-2023-28231 - BUFFER OVERFLOW - MICROSOFT DHCPv6(REQUEST) High
    2023/05/04DDI RULE 4840/vinfo/kr/threat-encyclopedia/network/ddi-rule-4840
    DDI RULE 4841 CVE-2022-43945 - Network File System RPC RCE EXPLOIT - TCP (Request) High
    2023/05/04DDI RULE 4841/vinfo/kr/threat-encyclopedia/network/ddi-rule-4841
    DDI RULE 4830 CVE-2023-0669 - FORTRA GOANYWHERE MFT RCE REQUEST - HTTP (Exploit) High
    2023/05/03DDI RULE 4830/vinfo/kr/threat-encyclopedia/network/ddi-rule-4830
    DDI RULE 4838 POWERSHELL SERIALIZATION RCE EXPLOIT - HTTP(REQUEST) High
    2023/04/27DDI RULE 4838/vinfo/kr/threat-encyclopedia/network/ddi-rule-4838
    DDI RULE 4835 CVE-2023-27350 - PaperCut MF/NG Authentication Bypass Exploit - HTTP (REQUEST) Low
    2023/04/26DDI RULE 4835/vinfo/kr/threat-encyclopedia/network/ddi-rule-4835
    DDI RULE 4836 CVE-2023-27351 - PaperCut MF/NG Authentication Bypass Exploit - HTTP (REQUEST) Low
    2023/04/26DDI RULE 4836/vinfo/kr/threat-encyclopedia/network/ddi-rule-4836
    DDI RULE 4837 CVE-2022-31814 - NETGATE RCE EXPLOIT - HTTP (Request) High
    2023/04/26DDI RULE 4837/vinfo/kr/threat-encyclopedia/network/ddi-rule-4837
    DDI RULE 4832 CVE-2022-31706 - VMWARE RCE RESPONSE - HTTP (Exploit) High
    2023/04/18DDI RULE 4832/vinfo/kr/threat-encyclopedia/network/ddi-rule-4832
    DDI RULE 4576 CVE-2021-31166 - HTTP Protocol RCE Exploit - HTTP (REQUEST) High
    2023/04/17DDI RULE 4576/vinfo/kr/threat-encyclopedia/network/ddi-rule-4576
    DDI RULE 4828 ICONICSTEALER - TCP(RESPONSE) High
    2023/04/12DDI RULE 4828/vinfo/kr/threat-encyclopedia/network/ddi-rule-4828
    DDI RULE 4831 CVE-2022-37958 - MS WINDOWS NEGOEX REQUEST - SMB2 (Exploit) High
    2023/04/05DDI RULE 4831/vinfo/kr/threat-encyclopedia/network/ddi-rule-4831
    DDI RULE 4825 CVE-2021-42756 - FORTIWEB BUFFER OVERFLOW - HTTP(REQUEST) High
    2023/04/04DDI RULE 4825/vinfo/kr/threat-encyclopedia/network/ddi-rule-4825
    DDI RULE 4826 FREBNIIS - HTTP (Request) High
    2023/03/30DDI RULE 4826/vinfo/kr/threat-encyclopedia/network/ddi-rule-4826
    DDI RULE 4824 SOCGHOULISH - HTTP (Request) High
    2023/03/29DDI RULE 4824/vinfo/kr/threat-encyclopedia/network/ddi-rule-4824
    DDI RULE 4822 CVE-2022-39952 - Fortinet FortiNAC RCE Exploit - HTTP (Request) High
    2023/03/28DDI RULE 4822/vinfo/kr/threat-encyclopedia/network/ddi-rule-4822
    DDI RULE 4823 POSSIBLE CVE-2023-23415 - REMOTE CODE EXECUTION - ICMP(REQUEST) High
    2023/03/27DDI RULE 4823/vinfo/kr/threat-encyclopedia/network/ddi-rule-4823
    DDI RULE 4818 CVE-2022-36804 - Atlassian Bitbucket Command Injection Exploit - HTTP(REQUEST) High
    2023/03/15DDI RULE 4818/vinfo/kr/threat-encyclopedia/network/ddi-rule-4818
    DDI RULE 4532 CVE-2021-26855 - Exchange Server Side Request Forgery Exploit - HTTP (REQUEST) - Variant 2 High
    2023/03/14DDI RULE 4532/vinfo/kr/threat-encyclopedia/network/ddi-rule-4532
    DDI RULE 4817 WINEXE DETECTED - SMB2(REQUEST) High
    2023/03/13DDI RULE 4817/vinfo/kr/threat-encyclopedia/network/ddi-rule-4817
    DDI RULE 4816 WINEXE DETECTED - SMB(REQUEST) High
    2023/03/09DDI RULE 4816/vinfo/kr/threat-encyclopedia/network/ddi-rule-4816
    DDI RULE 4815 CVE-2022-41082 - MS EXCHANGE POWERSHELL RCE EXPLOIT - HTTP(REQUEST) High
    2023/03/07DDI RULE 4815/vinfo/kr/threat-encyclopedia/network/ddi-rule-4815
    DDI RULE 4812 CVE-2022-1040 - SOPHOS FIREWALL USER PORTAL AND WEBADMIN REMOTE CODE EXECUTION - HTTP(EXPLOIT) High
    2023/02/16DDI RULE 4812/vinfo/kr/threat-encyclopedia/network/ddi-rule-4812
    DDI RULE 4811 CVE-2021-21974 - VMWARE OPENSLP RCE EXPLOIT - TCP(REQUEST) High
    2023/02/14DDI RULE 4811/vinfo/kr/threat-encyclopedia/network/ddi-rule-4811
    DDI RULE 4809 CVE-2022-31698 - VMWARE DDOS EXPLOIT - HTTP(REQUEST) High
    2023/02/13DDI RULE 4809/vinfo/kr/threat-encyclopedia/network/ddi-rule-4809
    DDI RULE 4806 CVE-2022-44877 - CENTOS WEB PANEL COMMAND INJECTION - HTTP(EXPLOIT) High
    2023/02/09DDI RULE 4806/vinfo/kr/threat-encyclopedia/network/ddi-rule-4806
    DDI RULE 4807 CVE-2022-47966 - ZOHO MANAGEENGINE RCE - HTTP(REQUEST) High
    2023/02/09DDI RULE 4807/vinfo/kr/threat-encyclopedia/network/ddi-rule-4807
    DDI RULE 4808 CVE-2022-40624 - NETGATE RCE EXPLOIT - HTTP(REQUEST) High
    2023/02/09DDI RULE 4808/vinfo/kr/threat-encyclopedia/network/ddi-rule-4808
    DDI RULE 4805 CVE-2022-21587 - ORACLE DESKTOP INTEGRATOR DIRECTORY TRAVERSAL EXPLOIT - HTTP(REQUEST) High
    2023/02/08DDI RULE 4805/vinfo/kr/threat-encyclopedia/network/ddi-rule-4805
    DDI RULE 4803 MALLOX - HTTP(REQUEST) High
    2023/01/30DDI RULE 4803/vinfo/kr/threat-encyclopedia/network/ddi-rule-4803
    DDI RULE 4802 CHISEL TUNNELING - HTTP(RESPONSE) High
    2023/01/17DDI RULE 4802/vinfo/kr/threat-encyclopedia/network/ddi-rule-4802
    DDI RULE 4754 BUGHATCH - HTTP(REQUEST) High
    2023/01/16DDI RULE 4754/vinfo/kr/threat-encyclopedia/network/ddi-rule-4754
    DDI RULE 4801 CVE-2022-29499 - MITEL MIVOICE RCE - HTTP(EXPLOIT) High
    2023/01/11DDI RULE 4801/vinfo/kr/threat-encyclopedia/network/ddi-rule-4801
    DDI RULE 4799 MIMIKATZ SHELL - TCP High
    2022/12/14DDI RULE 4799/vinfo/kr/threat-encyclopedia/network/ddi-rule-4799
    DDI RULE 4800 MIMIKATZ SHELL - HTTP(RESPONSE) High
    2022/12/14DDI RULE 4800/vinfo/kr/threat-encyclopedia/network/ddi-rule-4800
    DDI RULE 4755 PROXYHTA - HTTP(REQUEST) High
    2022/12/12DDI RULE 4755/vinfo/kr/threat-encyclopedia/network/ddi-rule-4755
    DDI RULE 2832 Possible CVE-2019-6340 Drupal8 RESTful Web Services Remote Code Execution - HTTP (Request) High
    2022/12/08DDI RULE 2832/vinfo/kr/threat-encyclopedia/network/ddi-rule-2832
    DDI RULE 4792 CVE-2022-35951 - REDIS INTEGER OVERFLOW - TCP(REQUEST) High
    2022/12/07DDI RULE 4792/vinfo/kr/threat-encyclopedia/network/ddi-rule-4792
    DDI RULE 4798 CVE-2022-30216 - WINDOWS SERVER SERVICES TAMPERING EXPLOIT - SMB2(REQUEST) High
    2022/12/01DDI RULE 4798/vinfo/kr/threat-encyclopedia/network/ddi-rule-4798
    DDI RULE 2722 CVE-2017-0146 - Remote Code Execution - SMB (Request) Medium
    2022/11/29DDI RULE 2722/vinfo/kr/threat-encyclopedia/network/ddi-rule-2722
    DDI RULE 4796 MICROSOFT EXCHANGE POWERSHELL EXPLOIT - HTTP(REQUEST) High
    2022/11/28DDI RULE 4796/vinfo/kr/threat-encyclopedia/network/ddi-rule-4796
    DDI RULE 4797 CVE-2022-34721 - Windows Internet Key Exchange - Buffer Overflow RCE ISKAMP EXPLOIT - UDP(REQUEST) High
    2022/11/28DDI RULE 4797/vinfo/kr/threat-encyclopedia/network/ddi-rule-4797
    DDI RULE 4786 CVE-2022-41040 - MS Exchange Server Side Request Forgery Exploit- HTTP(REQUEST) Medium
    2022/11/24DDI RULE 4786/vinfo/kr/threat-encyclopedia/network/ddi-rule-4786
    DDI RULE 4784 CVE-2021-22205 - GITLAB CE/EE REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) High
    2022/11/22DDI RULE 4784/vinfo/kr/threat-encyclopedia/network/ddi-rule-4784
    DDI RULE 4693 CVE-2022-30190 MICROSOFT WINDOWS SUPPORT DIAGNOSTIC TOOL RCE Exploit - HTTP (Response) High
    2022/11/22DDI RULE 4693/vinfo/kr/threat-encyclopedia/network/ddi-rule-4693
    DDI RULE 4795 CVE-2022-38129 - KEYSIGHT SMS DIRECTORY TRAVERSAL - HTTP(REQUEST) High
    2022/11/16DDI RULE 4795/vinfo/kr/threat-encyclopedia/network/ddi-rule-4795
    DDI RULE 4793 CVE-2022-3602 - OPENSSL BUFFER OVERFLOW EXPLOIT - TCP(REQUEST) High
    2022/11/14DDI RULE 4793/vinfo/kr/threat-encyclopedia/network/ddi-rule-4793
    DDI RULE 4790 CVE-2022-40684 - FORTINET AUTHBYPASS EXPLOIT - HTTP(REQUEST) High
    2022/10/24DDI RULE 4790/vinfo/kr/threat-encyclopedia/network/ddi-rule-4790
    DDI RULE 4791 CVE-2022-40300 - ZOHO MANAGEENGINE SQL CODE INJECTION - HTTP(REQUEST) High
    2022/10/24DDI RULE 4791/vinfo/kr/threat-encyclopedia/network/ddi-rule-4791
    DDI RULE 4789 CVE-2022-3236 - SOPHOS FIREWALL RCE - HTTP(REQUEST) High
    2022/10/19DDI RULE 4789/vinfo/kr/threat-encyclopedia/network/ddi-rule-4789
    DDI RULE 4788 CVE-2022-26013 - DELTA ELECTRONICS DIAENERGIE RCE EXPLOIT - HTTP(REQUEST) High
    2022/10/17DDI RULE 4788/vinfo/kr/threat-encyclopedia/network/ddi-rule-4788
    DDI RULE 4787 RPC POSSIBLE DCSYNC - DCE (REQUEST) - Variant 2 Medium
    2022/10/11DDI RULE 4787/vinfo/kr/threat-encyclopedia/network/ddi-rule-4787
    DDI RULE 4760 CVE-2022-22536 - SAP INTERNET COMMUNICATION MANAGER HTTP REQUEST SMUGGLING - HTTP(REQUEST) High
    2022/10/03DDI RULE 4760/vinfo/kr/threat-encyclopedia/network/ddi-rule-4760
    DDI RULE 4785 CVE-2022-40144 - Trend Micro Apex One Login Authentication Bypass Exploit - HTTP(REQUEST) High
    2022/09/27DDI RULE 4785/vinfo/kr/threat-encyclopedia/network/ddi-rule-4785
    DDI RULE 4751 CVE-2022-23270 - MICROSOFT POINT-TO-POINT TUNNELING PROTOCOL RCE - TCP(REQUEST) High
    2022/09/26DDI RULE 4751/vinfo/kr/threat-encyclopedia/network/ddi-rule-4751
    DDI RULE 4762 CVE-2022-30136 - MICROSOFT WINDOWS NFS BUFFER OVERFLOW EXPLOIT - TCP(REQUEST) High
    2022/09/22DDI RULE 4762/vinfo/kr/threat-encyclopedia/network/ddi-rule-4762
    DDI RULE 4766 CVE-2022-1660 - KEYSIGHT SENSOR INSECURE DESERIALIZATION - HTTP(REQUEST) High
    2022/09/21DDI RULE 4766/vinfo/kr/threat-encyclopedia/network/ddi-rule-4766
    DDI RULE 4752 CVE-2022-26809 - MICROSOFT WINDOWS RUNTIME LIBRARY INTEGER OVERFLOW EXPLOIT - SMB(RESPONSE) High
    2022/09/21DDI RULE 4752/vinfo/kr/threat-encyclopedia/network/ddi-rule-4752
    DDI RULE 4673 CVE-2022-26871 - TREND MICRO APEX CENTRAL REMOTE CODE EXECUTION - HTTP(REQUEST) High
    2022/09/21DDI RULE 4673/vinfo/kr/threat-encyclopedia/network/ddi-rule-4673
    DDI RULE 4783 CVE-2022-31474 - WordPress Plugin BackupBuddy Directory Traversal - HTTP(REQUEST) High
    2022/09/20DDI RULE 4783/vinfo/kr/threat-encyclopedia/network/ddi-rule-4783
    DDI RULE 4782 CVE-2022-34715 - MICROSOFT WINDOWS NFS BUFFER OVERFLOW EXPLOIT - TCP(REQUEST) High
    2022/09/19DDI RULE 4782/vinfo/kr/threat-encyclopedia/network/ddi-rule-4782
    DDI RULE 4756 CVE-2022-22980 - SPRING DATA MONGODB REMOTE CODE EXECUTION - HTTP(REQUEST) High
    2022/09/15DDI RULE 4756/vinfo/kr/threat-encyclopedia/network/ddi-rule-4756
    DDI RULE 4764 CVE-2022-30525 - ZYXEL FIREWALL COMMAND INJECTION - HTTP(REQUEST) High
    2022/09/15DDI RULE 4764/vinfo/kr/threat-encyclopedia/network/ddi-rule-4764
    DDI RULE 4781 CVE-2022-2135 - Advantech iView SQL Injection Exploit - HTTP(REQUEST) High
    2022/09/14DDI RULE 4781/vinfo/kr/threat-encyclopedia/network/ddi-rule-4781
    DDI RULE 4678 CVE-2022-22965 - SPRING RCE EXPLOIT - HTTP(REQUEST) High
    2022/09/14DDI RULE 4678/vinfo/kr/threat-encyclopedia/network/ddi-rule-4678
    DDI RULE 4688 COROXY - UDP(REQUEST) High
    2022/09/14DDI RULE 4688/vinfo/kr/threat-encyclopedia/network/ddi-rule-4688
    DDI RULE 4779 CVE-2022-35405 - ZOHO MANAGE ENGINE RCE EXPLOIT - HTTP(REQUEST) High
    2022/09/13DDI RULE 4779/vinfo/kr/threat-encyclopedia/network/ddi-rule-4779
    DDI RULE 4780 CVE-2022-2135 - HIKVISION WEB SERVER RCE EXPLOIT - HTTP(REQUEST) Low
    2022/09/07DDI RULE 4780/vinfo/kr/threat-encyclopedia/network/ddi-rule-4780
    DDI RULE 1007 WMI Execute Method Request detected Low
    2022/09/06DDI RULE 1007/vinfo/kr/threat-encyclopedia/network/ddi-rule-1007
    DDI RULE 4777 ANYDESK - HTTPS(REQUEST) High
    2022/08/31DDI RULE 4777/vinfo/kr/threat-encyclopedia/network/ddi-rule-4777
    DDI RULE 4778 ATERA - HTTP(REQUEST) High
    2022/08/30DDI RULE 4778/vinfo/kr/threat-encyclopedia/network/ddi-rule-4778
    DDI RULE 4775 CVE-2022-31656 - VMWARE AUTHBYPASS EXPLOIT - HTTP(REQUEST) Medium
    2022/08/23DDI RULE 4775/vinfo/kr/threat-encyclopedia/network/ddi-rule-4775
    DDI RULE 4776 CVE-2022-31659 - VMWARE AUTHBYPASS EXPLOIT - HTTP(REQUEST) High
    2022/08/23DDI RULE 4776/vinfo/kr/threat-encyclopedia/network/ddi-rule-4776
    DDI RULE 4774 CVE-2022-27925 - ZIMBRA RCE EXPLOIT - HTTP(REQUEST) High
    2022/08/22DDI RULE 4774/vinfo/kr/threat-encyclopedia/network/ddi-rule-4774
    DDI RULE 4773 CVE-2022-21972 - PTPP REMOTE CODE EXECUTION - TCP(EXPLOIT) High
    2022/08/18DDI RULE 4773/vinfo/kr/threat-encyclopedia/network/ddi-rule-4773
    DDI RULE 4768 SUSPICIOUS WINREG - SMB2(REQUEST) High
    2022/08/16DDI RULE 4768/vinfo/kr/threat-encyclopedia/network/ddi-rule-4768
    DDI RULE 4772 WEBDAV DIRECTORY TRAVERSAL EXPLOIT - HTTP(RESPONSE) High
    2022/08/12DDI RULE 4772/vinfo/kr/threat-encyclopedia/network/ddi-rule-4772
    DDI RULE 4759 COMMAND INJECTION EXPLOIT SENSOR - HTTP (REQUEST) - Variant 2 Medium
    2022/08/11DDI RULE 4759/vinfo/kr/threat-encyclopedia/network/ddi-rule-4759
    DDI RULE 4771 WVKEYLOGGER - HTTP(REQUEST) High
    2022/08/02DDI RULE 4771/vinfo/kr/threat-encyclopedia/network/ddi-rule-4771
    DDI RULE 4765 CVE-2021-43983 - BUFFER OVERFLOW - HTTP(RESPONSE) High
    2022/07/28DDI RULE 4765/vinfo/kr/threat-encyclopedia/network/ddi-rule-4765
    DDI RULE 4767 CVE-2021-46381 - DLINK DIRECTORY TRAVERSAL - HTTP(REQUEST) High
    2022/07/28DDI RULE 4767/vinfo/kr/threat-encyclopedia/network/ddi-rule-4767
    DDI RULE 4770 CVE-2022-23277 - EXCHANGE RCE EXPLOIT - HTTP(REQUEST) High
    2022/07/27DDI RULE 4770/vinfo/kr/threat-encyclopedia/network/ddi-rule-4770
    DDI RULE 4769 CVE-2021-31805 - APACHE STRUTS OGNL RCE EXPLOIT - HTTP(REQUEST) High
    2022/07/26DDI RULE 4769/vinfo/kr/threat-encyclopedia/network/ddi-rule-4769
    DDI RULE 4763 CVE-2021-46422 - COMMAND INJECTION - HTTP(REQUEST) High
    2022/07/20DDI RULE 4763/vinfo/kr/threat-encyclopedia/network/ddi-rule-4763
    DDI RULE 4697 FILE UPLOAD - HTTP(REQUEST) High
    2022/07/18DDI RULE 4697/vinfo/kr/threat-encyclopedia/network/ddi-rule-4697
    DDI RULE 4761 CVE-2022-31626 - PHP BUFFER OVERFLOW - HTTP(REQUEST) High
    2022/07/14DDI RULE 4761/vinfo/kr/threat-encyclopedia/network/ddi-rule-4761
    DDI RULE 4758 REMOTE CODE EXECUTION - HTTP (REQUEST) - Variant 5 High
    2022/07/12DDI RULE 4758/vinfo/kr/threat-encyclopedia/network/ddi-rule-4758
    DDI RULE 2573 MINER - TCP (Request) Medium
    2022/07/06DDI RULE 2573/vinfo/kr/threat-encyclopedia/network/ddi-rule-2573
    DDI RULE 2586 NECURS - HTTP (Request) - Variant 4 Medium
    2022/07/06DDI RULE 2586/vinfo/kr/threat-encyclopedia/network/ddi-rule-2586
    DDI RULE 4757 CVE-2022-26937 - NFS BUFFER OVERFLOW EXPLOIT - TCP(RESPONSE) High
    2022/07/05DDI RULE 4757/vinfo/kr/threat-encyclopedia/network/ddi-rule-4757
    DDI RULE 4641 CVE-2021-44228 - OGNL EXPLOIT - HTTP(REQUEST) Medium
    2022/06/29DDI RULE 4641/vinfo/kr/threat-encyclopedia/network/ddi-rule-4641
    DDI RULE 4753 CVE-2022-26809 - RPC INTEGER OVERFLOW - DCE(RESPONSE) High
    2022/06/20DDI RULE 4753/vinfo/kr/threat-encyclopedia/network/ddi-rule-4753
    DDI RULE 4750 CVE-2022-28213 - SAP XXE EXPLOIT - HTTP(REQUEST) High
    2022/06/15DDI RULE 4750/vinfo/kr/threat-encyclopedia/network/ddi-rule-4750
    DDI RULE 4698 ENVELOPE SQL INJECTION - HTTP(REQUEST) High
    2022/06/13DDI RULE 4698/vinfo/kr/threat-encyclopedia/network/ddi-rule-4698
    DDI RULE 4699 ENVELOPE SQL INJECTION - HTTP (REQUEST) - Variant 2 High
    2022/06/13DDI RULE 4699/vinfo/kr/threat-encyclopedia/network/ddi-rule-4699
    DDI RULE 4695 SSRF EXPLOIT - HTTP(REQUEST) High
    2022/06/09DDI RULE 4695/vinfo/kr/threat-encyclopedia/network/ddi-rule-4695
    DDI RULE 4696 BLIND SSRF EXPLOIT - HTTP(REQUEST) High
    2022/06/09DDI RULE 4696/vinfo/kr/threat-encyclopedia/network/ddi-rule-4696
    DDI RULE 4694 OGNL REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) High
    2022/06/07DDI RULE 4694/vinfo/kr/threat-encyclopedia/network/ddi-rule-4694
    DDI RULE 4692 CVE-2019-18935 - TELERIK UI RCE - HTTP(REQUEST) High
    2022/06/01DDI RULE 4692/vinfo/kr/threat-encyclopedia/network/ddi-rule-4692
    DDI RULE 4689 POSSIBLE SQL INJECT RCE EXPLOIT - HTTP (SEN) - Variant 2 Medium
    2022/05/27DDI RULE 4689/vinfo/kr/threat-encyclopedia/network/ddi-rule-4689
    DDI RULE 4691 CVE-2022-21907 - RCE EXPLOIT - HTTP (REQUEST) - Variant 2 Medium
    2022/05/24DDI RULE 4691/vinfo/kr/threat-encyclopedia/network/ddi-rule-4691
    DDI RULE 2341 COBALTSTRIKE - HTTP (Request) High
    2022/05/19DDI RULE 2341/vinfo/kr/threat-encyclopedia/network/ddi-rule-2341
    DDI RULE 4690 CVE-2021-4039 - ZYXEL NWA COMMAND INJECTION - HTTP(REQUEST) High
    2022/05/18DDI RULE 4690/vinfo/kr/threat-encyclopedia/network/ddi-rule-4690
    DDI RULE 4687 METASPLOIT COBALTSTRIKE STAGER - HTTP(RESPONSE) High
    2022/05/12DDI RULE 4687/vinfo/kr/threat-encyclopedia/network/ddi-rule-4687
    DDI RULE 1639 UPATRE HTTP GET Request - Class 1 High
    2022/05/12DDI RULE 1639/vinfo/kr/threat-encyclopedia/network/ddi-rule-1639
    DDI RULE 4685 CVE-2021-22204 - REMOTE CODE EXECUTION - HTTP(EXPLOIT) High
    2022/05/10DDI RULE 4685/vinfo/kr/threat-encyclopedia/network/ddi-rule-4685

    30일간 트렌드마이크로 서비스 무료로 사용해 보기

    • 무료 평가판 지금 시작

    리소스

    • 블로그
    • 뉴스룸
    • 위협 보고서
    • DevOps 리소스 센터
    • CISO 리소스 센터
    • 파트너 찾기

    지원

    • Business Support Portal
    • 문의
    • 다운로드
    • 무료 평가판

    트렌드마이크로 정보

    • 당사 소개
    • 인재 채용
    • 위치
    • 이벤트 안내
    • Trust Center

    국가별 본사

    트렌드마이크로 - 한국

    테헤란로 508 해성 2빌딩 15층
    (06178) 서울 강남구

    전화: +82-2-561-0990

    국가 / 지역 선택

    close

    아메리카

    • 미국
    • 브라질
    • 캐나다
    • 멕시코

    중동 & 아프리카

    • 남아프리카공화국
    • 중동 및 북아프리카

    유럽

    • 벨기에
    • 체코
    • 덴마크
    • 독일, 스위스
    • 스페인
    • 프랑스
    • 아일랜드
    • 이탈리아
    • 네덜란드
    • 노르웨이
    • 폴란드
    • 핀란드
    • 스웨덴
    • 터키
    • 영국

    아시아 & 태평양

    • 호주
    • 중앙 아시아
    • 홍콩(영어)
    • 홍콩
    • 인도
    • 인도네시아
    • 일본
    • 대한민국
    • 말레이시아
    • 몽골, 조지아
    • 뉴질랜드
    • 필리핀
    • 싱가포르
    • 대만
    • 태국
    • 베트남

    개인정보보호 | 법률 | 접근성 | 사이트 맵

    Copyright ©2024 Trend Micro Incorporated. All rights reserved.