Business

search close
  • 솔루션
    • 과제별
      • 과제별
        • 과제별
          자세히 알아보기
      • 위험 이해, 우선순위 지정 및 위험 완화
        • 위험 이해, 우선순위 지정 및 위험 완화

          공격 표면 관리를 통한 위험 태세 개선

          자세히 알아보기
      • 클라우드 네이티브 앱 보호
        • 클라우드 네이티브 앱 보호

          비즈니스 성과를 실현해 주는 보안

          자세히 알아보기
      • 하이브리드 환경 보호
        • 하이브리드 및 멀티 클라우드 보호

          보안을 통해 가시성 확보 및 비즈니스 요구사항 충족

          자세히 알아보기
      • 전 세계 직원 보호
        • 전 세계 직원 보호

          어디서나 어떤 장치에서나 자신 있게 연결

          자세히 알아보기
      • 네트워크 사각지대 제거
        • 네트워크 사각지대 제거

          전체 환경에서 사용자와 핵심 운영 활동을 보호

          자세히 알아보기
      • 빠른 탐지와 정확한 대응.
        • 빠른 탐지와 정확한 대응.

          강력한 전용 XDR, 공격 표면 위험 관리 및 제로 트러스트 기능으로 공격자보다 더 빠르게 움직입니다.

          자세히 알아보기
      • Extend Your Team
        • 팀 역량 강화 위협에 민첩하게 대응

          선제적 위험 감소와 관리형 서비스로 효율성 극대화

          자세히 알아보기
      • 제로 트러스트 운영
        • 제로 트러스트 운영

          단일 콘솔에서 공격 표면 이해, 위험 실시간 분석, 그리고 네트워크, 워크로드 및 장치 전반에서 정책 조정

          자세히 알아보기
    • 역할별
      • 역할별
        • 역할별
          자세히 알아보기
      • CISO
        • CISO

          측정 가능한 사이버 보안 성과로 비즈니스 가치 향상

          자세히 알아보기
      • SOC 관리자
        • SOC 관리자

          더 많은 위협에 빠르게 대응

          자세히 알아보기
      • 인프라 관리자
        • 인프라 관리자

          보안을 강화해 위협을 빠르고 효과적으로 완화

          자세히 알아보기
      • 클라우드 빌더 및 개발자
        • 클라우드 빌더 및 개발자

          코드가 의도대로 실행되는지 확인

          자세히 알아보기
      • 클라우드 보안 Ops
        • 클라우드 보안 Ops

          클라우드 환경용 보안으로 가시성과 제어력 확보

          자세히 알아보기
    • 산업별
      • 산업별
        • 산업별
          자세히 알아보기
      • Healthcare
        • 의료 서비스

          의료 서비스 규정을 준수하면서 환자 데이터, 장치 및 네트워크 보호

          자세히 알아보기
      • Manufacturing
        • 제조

          기존 장치에서 최첨단 인프라에 이르기까지 공장 환경 보호

          자세히 알아보기
      • 석유 및 가스
        • 석유 및 가스

          석유 및 가스 설비 산업을 위한 ICS/OT 보안

          자세히 알아보기
      • 전기 유틸리티
        • 전기 유틸리티

          전기 유틸리티를 위한 ICS/OT 보안

          자세히 알아보기
      • 자동차
        • 자동차
          자세히 알아보기
      • 5G 네트워크
        • 5G 네트워크
          자세히 알아보기
    • 중소기업 보안
      • 중소기업 보안

        종합적인 보호 기능으로 위협 차단

        자세히 알아보기
  • 플랫폼
    • Vision One 플랫폼
      • Vision One 플랫폼
        • Trend Vision One
          트렌드마이크로의 통합된 플랫폼

          위협 방지와 사이버 위험 관리를 연결하여 보안 성과를 강화하십시오

          자세히 알아보기
      • AI 컴패니언
        • Trend Vision One Companion

          생성형 AI 사이버 보안 도우미

          자세히 보기
    • 엔드포인트 보안
      • 엔드포인트 보안
        • 엔드포인트 보안 개요

          공격의 모든 단계에서 엔드포인트 방어

          자세히 알아보기
      • 워크로드 보안
        • 워크로드 보안

          엔드포인트, 서버 및 클라우드 워크로드에 대한 최적화된 보호, 탐지 및 대응

          자세히 알아보기
      • 산업 엔드포인트 보안
        • 산업 엔드포인트 보안
          자세히 알아보기
      • 모바일 보안
        • 모바일 보안

          멀웨어, 악성 애플리케이션 및 기타 모바일 위협에 대한 온프레미스 및 클라우드 보호

          자세히 알아보기
      • 엔드포인트용 XDR
        • 엔드포인트용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
    • 클라우드 보안
      • 클라우드 보안
        • Trend Vision One™
          클라우드 보안 개요

          개발자, 보안 팀, 기업을 위한 가장 신뢰할 수 있는 클라우드 보안 플랫폼

          자세히 알아보기
      • Workload Security
        • 워크로드 보안

          CNAPP 기능을 지원하는 클라우드 보안 플랫폼을 활용하여 성능 손상 없이 데이터 센터, 클라우드 및 컨테이너를 보호합니다.

          자세히 알아보기
      • Container Security
        • Container Security

          고급 컨테이너 이미지 스캔, 정책 기반 승인 제어, 컨테이너 런타임 보호를 통해 클라우드 네이티브 애플리케이션의 보안을 단순화합니다.

          자세히 알아보기
      • File Storage Security
        • File Storage Security

          클라우드 네이티브 애플리케이션 아키텍처를 활용하는 클라우드 파일/개체 스토리지 서비스를 위한 보안

          자세히 알아보기
      • 클라우드용 공격 표면 위험 관리
        • 클라우드용 공격 표면 위험 관리

          단일 솔루션으로 클라우드 자산 탐색, 취약성 우선 순위 지정, 클라우드 보안 태세 관리, 공격 표면 관리 제공

          자세히 알아보기
      • 클라우드용 XDR
        • 클라우드용 XDR

          클라우드에 대한 가시성을 확장하고 SOC 조사를 간소화하십시오.

          자세히 알아보기
    • 네트워크 보안
      • 네트워크 보안
        • 네트워크 보안 개요

          네트워크 탐지 및 대응으로 XDR 성능 확장

          자세히 알아보기
      • 네트워크 침입 방지(IPS)
        • 네트워크 침입 방지(IPS)

          알려지거나 알려지지 않거나, 또는 공개되지 않은 취약점으로부터 네트워크를 보호합니다

          자세히 알아보기
      • Breach Detection System(BDS)
        • Breach Detection System(BDS)

          인바운드, 아웃바운드 및 측면으로 이동하는 표적 공격을 탐지하고 이에 대응합니다.

          자세히 알아보기
      • 시큐어 서비스 엣지(SSE)
        • 시큐어 서비스 엣지(SSE)

          지속적인 위험 평가를 통해 신뢰할 수 있고 안전한 디지털 혁신을 새롭게 재정립

          자세히 알아보기
      • 산업 네트워크 보안
        • 산업 네트워크 보안
          자세한 내용
      • 네트워크용 XDR
        • 네트워크용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
      • 5G 네트워크 보안
        • 5G 네트워크 보안
          자세히 알아보기
    • 모든 제품, 서비스 및 평가판
      • 모든 제품, 서비스 및 평가판
        자세히 알아보기
    • 공격 표면 관리
      • 공격 표면 관리

        발생 전에 침해 차단하기

        자세히 알아보기
    • 이메일 보안
      • 이메일 보안
        • 이메일 보안

          피싱, 멀웨어, 랜섬웨어, 사기 및 표적형 공격이 기업에 침투하는 것을 방지합니다.

          자세히 보기
      • 이메일 및 협업 보안
        • Trend Vision One™
          이메일 및 협업 보안

          Microsoft 365 및 Google Workspace를 비롯한 모든 전자 메일 서비스에서 피싱, 랜섬웨어 및 표적 공격 차단

          자세히 보기
    • XDR(확장된 탐지 및 대응)
      • XDR(확장된 탐지 및 대응)

        위협을 더 빠르게 추적하고, 탐지하고, 조사 및 대응하기 위해 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하십시오.

        자세히 알아보기
    • 위협 인텔리전스
      • 위협 인텔리전스

        지속적인 위협 예방 및 분석을 통해 최신 위협보다 한발 앞서나가고 중요 데이터를 보호하십시오.

        자세히 알아보기
    • IoT 보안
      • IoT 보안
        • IoT 보안

          ICS/OT 보안을 위한 솔루션에 대해 알아보십시오.

          자세히 알아보기
      • 산업 엔드포인트 보안
        • 산업 엔드포인트 보안
          자세히 알아보기
      • 산업 네트워크 보안
        • 산업 네트워크 보안
          산업 네트워크 보안
      • OT용 XDR
        • OT용 XDR

          단일 플랫폼에서 더 폭넓은 관점 및 더 나은 컨텍스트를 확보하여 공격자들을 더 빠르게 차단하고 위협을 추적, 탐지, 조사 및 대응하십시오.

          자세히 알아보기
  • 리서치
    • 리서치
      • 리서치
        • 리서치
          자세히 알아보기
      • 리서치, 뉴스 및 전망
        • 리서치, 뉴스 및 전망
          자세히 알아보기
      • 리서치 결과 및 분석 보고서
        • 리서치 결과 및 분석 보고서
          자세히 알아보기
      • 보안 뉴스
        • 보안 뉴스
          자세히 알아보기
      • 제로 데이 이니셔티브(ZDI)
        • 제로 데이 이니셔티브(ZDI)
          자세히 알아보기
  • 서비스
    • 트렌드마이크로 서비스
      • 트렌드마이크로 서비스
        • 트렌드마이크로 서비스
          자세히 알아보기
      • 서비스 패키지
        • 서비스 패키지

          연중무휴 관리형 탐지 및 대응, 지원을 통해 보안 팀의 역량을 강화하십시오

          자세히 알아보기
      • Managed XDR
        • Managed XDR

          이메일, 엔드포인트, 서버, 클라우드 워크로드 및 네트워크를 위한 전문 관리형 탐지 및 대응(MDR)으로 팀을 확장합니다.

          자세히 알아보기
      • 사고 대응
        • 사고 대응
          • 사고 대응

            귀사가 위반을 경험하고 있거나 IR 계획을 선제적으로 개선하고자 하는 경우 신뢰할 수 있는 전문가가 대기하고 있습니다.

            자세히 알아보기
        • 보험사 및 로펌
          • 보험사 및 로펌

            업계 최고의 탐지 및 대응 기술로 위협을 차단하고 고객의 청구 비용 및 다운 타임을 줄이십시오.

            자세히 알아보기
      • 지원 서비스
        • 지원 서비스
          자세히 알아보기
  • 파트너
    • 파트너 프로그램
      • 파트너 프로그램
        • 파트너 프로그램 개요

          업계 최고의 완벽한 다계층 보안을 통해 비즈니스를 성장 시키고 고객을 보호하십시오.

          자세히 알아보기
      • 관리형 보안 서비스 제공업체
        • 관리형 보안 서비스 제공업체

          업계 최고의 XDR로 최신 보안 운영 서비스 제공

          자세히 알아보기
      • Managed Service Provider
        • 관리 서비스 공급자(MSP)

          클라우드 보안 글로벌 마켓을 리드하는 트렌드마이크로 Deep Security

          자세히 알아보기
      • Cloud Service Provider
        • 클라우드 서비스 공급자(CSP)

          사용하는 플랫폼에 관계없이 클라우드 서비스 오퍼링에 시장을 선도하는 보안을 추가하십시오.

          자세히 알아보기
      • 전문가 서비스
        • 전문가 서비스

          업계 최고의 보안 파트너를 통한 매출 증대

          자세히 알아보기
      • 리셀러
        • 리셀러

          가능성 알아보기

          자세히 알아보기
      • 마켓플레이스
        • 마켓플레이스
          자세히 알아보기
      • 시스템 통합 벤더
        • 시스템 통합업체
          자세히 알아보기
    • 제휴 파트너
      • 제휴 파트너
        • 제휴 개요

          트렌드마이크로는 성과와 가치를 높이기 위해 최선의 노력을 다하고 있습니다.

          자세히 알아보기
      • 기술 제휴 파트너
        • 기술 제휴 파트너
          자세히 알아보기
      • 트렌드마이크로의 전략적 제휴 파트너
        • 트렌드마이크로의 전략적 제휴 파트너
          자세히 알아보기
    • 파트너 도구
      • 파트너 도구
        • 파트너 도구
          자세히 알아보기
      • 파트너 로그인
        • 파트너 로그인
          로그인
      • 교육 및 인증
        • 교육 및 인증
          자세히 알아보기
      • 파트너 성공
        • 파트너 성공
          자세히 알아보기
      • 유통 업체
        • 유통 업체
          자세히 알아보기
      • 파트너 찾기
        • 파트너 찾기
          자세히 보기
  • 회사
    • 트렌드마이크로를 선택해야 하는 이유
      • 트렌드마이크로를 선택해야 하는 이유
        • 트렌드마이크로를 선택해야 하는 이유
          자세히 보기
      • 고객 성공 사례
        • 고객 성공 사례
          자세히 알아보기
      • 수상 경력
        • 수상 경력
          자세히 알아보기
      • 전략적 제휴
        • 전략적 제휴
          자세히 알아보기
      • 인재 채용
        • 인재 채용
          자세히 알아보기
    • 트렌드마이크로 비교
      • 트렌드마이크로 비교
        • 트렌드마이크로 비교

          트렌드마이크로가 경쟁 우위를 차지하는 방법 알아보기

          시작하기
      • CrowdStrike와 비교
        • 트렌드마이크로 대 CrowdStrike

          Crowdstrike는 클라우드 네이티브 플랫폼을 통해 효과적인 사이버 보안을 제공하지만, 진정한 단일 플랫폼을 통한 비용 효율성을 극대화하고자 하는 조직의 경우 클라우드 네이티브 플랫폼의 가격으로 인해 예산이 늘어날 수 있습니다.

          시작하기
      • Microsoft와 비교
        • 트렌드마이크로 대 Microsoft

          Microsoft는 기본적인 보안 계층을 제공하지만, 고객의 보안 문제를 완전히 해결하기 위해서는 보완 솔루션이 필요한 경우가 많습니다.

          시작하기
      • Palo Alto Networks와 비교
        • 트렌드마이크로 대 Palo Alto Networks

          Palo Alto Networks는 고급 사이버 보안 솔루션을 제공하지만, 포괄적인 제품군을 탐색하는 것은 복잡할 수 있으며 모든 기능을 활용하려면 상당한 예산을 투자해야 합니다.

          시작하기
    • 당사 소개
      • 당사 소개
        • 당사 소개
          자세히 알아보기
      • Trust Center
        • Trust Center
          자세히 알아보기
      • 역사
        • 역사
          자세히 알아보기
      • 다양성, 형평성 및 포용성
        • 다양성, 형평성 및 포용성
          자세히 알아보기
      • 기업의 사회적 책임
        • 기업의 사회적 책임
          자세히 알아보기
      • 리더십
        • 리더십
          자세히 알아보기
      • 보안 전문가
        • 보안 전문가
          자세히 알아보기
      • 인터넷 안전과 사이버 보안 교육
        • 인터넷 안전과 사이버 보안 교육
          자세히 알아보기
      • 법률
        • 법률
          자세히 알아보기
      • 투자자
        • 투자자
          자세히 알아보기
      • 포뮬러 E 레이싱
        • 포뮬러 E 레이싱
          자세히 보기
    • 최신 뉴스
      • 최신 뉴스
        • 최신 뉴스
          자세히 알아보기
      • 뉴스룸
        • 뉴스룸
          자세히 알아보기
      • 이벤트
        • 이벤트
          자세히 알아보기
      • 커리어
        • 인재 채용
          자세히 알아보기
      • 웨비나
        • 웨비나
          자세히 알아보기
  • 무료 평가판
  • 문의
가정용 제품을 찾으십니까?
사이버 공격을 받고 있습니까?
지원
  • 기업 지원 포털
  • 교육 및 인증
  • 지원 연락처
  • 지원 파트너 찾기
리소스
  • 트렌드마이크로 대 경쟁사
  • 사이버 위험 지수/평가
  • CISO 리소스 센터
  • DevOps 리소스 센터
  • 정의
  • 위협 백과사전
  • 클라우드 상태 평가
  • 사이버 보험
  • 용어집
  • 웨비나
로그인
  • Vision One
  • 지원
  • 파트너 포털
  • Cloud One
  • 제품 활성화 및 관리
  • Referral 제휴사
arrow_back
search
close
  • Threat Encyclopedia
  • Network Content Inspection Rules

Network Content Inspection Rules

    Confidence Level:  
    Low
    Medium
    High
    Default Rule:  
    Rule IDRule DescriptionConfidence LevelDDI Default RuleNetwork Content Inspection Pattern Release Date
    DDI RULE 5421 APT - BPFDOOR - UDP High
    2025/06/26DDI RULE 5421/vinfo/kr/threat-encyclopedia/network/ddi-rule-5421
    DDI RULE 5420 APT - BPFDOOR - TCP High
    2025/06/19DDI RULE 5420/vinfo/kr/threat-encyclopedia/network/ddi-rule-5420
    DDI RULE 5413 CVE-2025-46337 - ADODB SQL INJECTION - HTTP (Response) High
    2025/06/10DDI RULE 5413/vinfo/kr/threat-encyclopedia/network/ddi-rule-5413
    DDI RULE 5406 ECHARGE COMMAND INJECTION EXPLOIT - HTTP (Response) High
    2025/05/29DDI RULE 5406/vinfo/kr/threat-encyclopedia/network/ddi-rule-5406
    DDI RULE 5394 CVE-2024-57050 - TPLINK EXPLOIT - HTTP(Response) High
    2025/05/13DDI RULE 5394/vinfo/kr/threat-encyclopedia/network/ddi-rule-5394
    DDI RULE 5392 CVE-2024-23468 - SOLARWINDS PATH TRAVERSAL - TCP (Request) High
    2025/05/07DDI RULE 5392/vinfo/kr/threat-encyclopedia/network/ddi-rule-5392
    DDI RULE 5387 CVE-2023-44221 - SONICWALL EXPLOIT COMMAND INJECTION EXPLOIT - HTTP(RESPONSE) High
    2025/05/03DDI RULE 5387/vinfo/kr/threat-encyclopedia/network/ddi-rule-5387
    DDI RULE 5385 CVE-2021-47667 - ZENDTO RCE - HTTP (Request) High
    2025/04/30DDI RULE 5385/vinfo/kr/threat-encyclopedia/network/ddi-rule-5385
    DDI RULE 5382 CVE-2025-31324 - SAP NETWEAVER UPLOAD EXPLOIT REQUEST - HTTP(REQUEST) High
    2025/04/26DDI RULE 5382/vinfo/kr/threat-encyclopedia/network/ddi-rule-5382
    DDI RULE 5377 ROUTER CLEARTEXT PASSWORD DISCLOSURE EXPLOIT - HTTP (Request) High
    2025/04/22DDI RULE 5377/vinfo/kr/threat-encyclopedia/network/ddi-rule-5377
    DDI RULE 5375 CVE-2024-10188 - LITELLM DOS - HTTP (Request) High
    2025/04/16DDI RULE 5375/vinfo/kr/threat-encyclopedia/network/ddi-rule-5375
    DDI RULE 5369 IVANTI TRAVERSAL EXPLOIT - HTTP(Response) High
    2025/04/15DDI RULE 5369/vinfo/kr/threat-encyclopedia/network/ddi-rule-5369
    DDI RULE 5363 CVE-2024-50330 - IVANTI SQL INJECTION - HTTP (Response) High
    2025/04/02DDI RULE 5363/vinfo/kr/threat-encyclopedia/network/ddi-rule-5363
    DDI RULE 5359 CVE-2018-8639 - Win32k Privilege Escalation Exploit - HTTP (Response) High
    2025/03/26DDI RULE 5359/vinfo/kr/threat-encyclopedia/network/ddi-rule-5359
    DDI RULE 5353 CVE-2024-45195 - APACHE OFBIZ RCE EXPLOIT - HTTP(Request) High
    2025/03/17DDI RULE 5353/vinfo/kr/threat-encyclopedia/network/ddi-rule-5353
    DDI RULE 5349 SVCCTL Start Service - SMB2 (Request) High
    2025/03/13DDI RULE 5349/vinfo/kr/threat-encyclopedia/network/ddi-rule-5349
    DDI RULE 5340 LBLINK COMMAND INJECTION EXPLOIT - HTTP (Request) High
    2025/03/05DDI RULE 5340/vinfo/kr/threat-encyclopedia/network/ddi-rule-5340
    DDI RULE 5323 CVE-2024-49112 - INTEGER OVERFLOW EXPLOIT - LDAP (Response) High
    2025/02/20DDI RULE 5323/vinfo/kr/threat-encyclopedia/network/ddi-rule-5323
    DDI RULE 5305 CVE-2024-42327 - Zabbix SQL Injection - HTTP (Response) High
    2025/02/18DDI RULE 5305/vinfo/kr/threat-encyclopedia/network/ddi-rule-5305
    DDI RULE 5318 CVE-2025-0282 - IVANTI RCE EXPLOIT - HTTP(Request) High
    2025/02/17DDI RULE 5318/vinfo/kr/threat-encyclopedia/network/ddi-rule-5318
    DDI RULE 5320 CVE-2025-0107 - Palo Alto Networks Expedition Insecure Deserialization Exploit - HTTP (Response) High
    2025/02/17DDI RULE 5320/vinfo/kr/threat-encyclopedia/network/ddi-rule-5320
    DDI RULE 5316 CVE-2024-37404 - IVANTI RCE EXPLOIT - HTTP (Response) High
    2025/02/12DDI RULE 5316/vinfo/kr/threat-encyclopedia/network/ddi-rule-5316
    DDI RULE 5314 ADCS Suspicious use of Certificate - Kerberos (Request) High
    2025/02/11DDI RULE 5314/vinfo/kr/threat-encyclopedia/network/ddi-rule-5314
    DDI RULE 5310 CVE-2024-52047 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (Request) High
    2025/02/06DDI RULE 5310/vinfo/kr/threat-encyclopedia/network/ddi-rule-5310
    DDI RULE 5312 CVE-2024-40711 - Veeam Backup & Replication Remote Command Execution Exploit - HTTP (Response) High
    2025/02/06DDI RULE 5312/vinfo/kr/threat-encyclopedia/network/ddi-rule-5312
    DDI RULE 5303 CVE-2024-51378 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5303/vinfo/kr/threat-encyclopedia/network/ddi-rule-5303
    DDI RULE 5311 CVE-2022-22947 - SPRINGCLOUD RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5311/vinfo/kr/threat-encyclopedia/network/ddi-rule-5311
    DDI RULE 5292 CVE-2024-47575 - FORTIMANAGER RCE EXPLOIT - HTTP (Response) High
    2025/02/04DDI RULE 5292/vinfo/kr/threat-encyclopedia/network/ddi-rule-5292
    DDI RULE 5304 CVE-2024-12828 - WEBMIN RCE EXPLOIT - HTTP (Response) High
    2025/01/30DDI RULE 5304/vinfo/kr/threat-encyclopedia/network/ddi-rule-5304
    DDI RULE 5306 CVE-2024-53691 - QNAP RCE - HTTP (Request) High
    2025/01/30DDI RULE 5306/vinfo/kr/threat-encyclopedia/network/ddi-rule-5306
    DDI RULE 5307 CVE-2024-50388 - QNAP BACKUP EXPLOIT - HTTP(Request) High
    2025/01/30DDI RULE 5307/vinfo/kr/threat-encyclopedia/network/ddi-rule-5307
    DDI RULE 5302 CVE-2024-8963 - IVANTI AUTH BYPASS EXPLOIT - HTTP (Response) High
    2025/01/24DDI RULE 5302/vinfo/kr/threat-encyclopedia/network/ddi-rule-5302
    DDI RULE 5300 CVE-2024-29847 - IVANTI RCE EXPLOIT - TCP (Request) High
    2025/01/22DDI RULE 5300/vinfo/kr/threat-encyclopedia/network/ddi-rule-5300
    DDI RULE 5301 CVE-2024-50603 - AVIATRIX COMMAND INJECTION - HTTP (Request) High
    2025/01/21DDI RULE 5301/vinfo/kr/threat-encyclopedia/network/ddi-rule-5301
    DDI RULE 5246 Entropy Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5246/vinfo/kr/threat-encyclopedia/network/ddi-rule-5246
    DDI RULE 5247 Base64 Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5247/vinfo/kr/threat-encyclopedia/network/ddi-rule-5247
    DDI RULE 5299 HTTP Websocket Connection to External Server (Request) Low
    2025/01/16DDI RULE 5299/vinfo/kr/threat-encyclopedia/network/ddi-rule-5299
    DDI RULE 1268 Reverse HTTPS Meterpreter detected - Variant 2 High
    2025/01/15DDI RULE 1268/vinfo/kr/threat-encyclopedia/network/ddi-rule-1268
    DDI RULE 5298 CVE-2024-5011 - WHATSUP GOLD EXPLOIT - HTTP (Request) High
    2025/01/15DDI RULE 5298/vinfo/kr/threat-encyclopedia/network/ddi-rule-5298
    DDI RULE 2744 OMRON FINS UDP Read Controller Attempt NSE - UDP (Request) Low
    2025/01/13DDI RULE 2744/vinfo/kr/threat-encyclopedia/network/ddi-rule-2744
    DDI RULE 5294 CVE-2024-38856 - OFBIZ AUTHBYPASS EXPLOIT - HTTP (Response) High
    2025/01/08DDI RULE 5294/vinfo/kr/threat-encyclopedia/network/ddi-rule-5294
    DDI RULE 5289 CVE-2024-49122 - MSMQ RCE EXPLOIT - TCP (Response) High
    2025/01/07DDI RULE 5289/vinfo/kr/threat-encyclopedia/network/ddi-rule-5289
    DDI RULE 5290 CVE-2024-9464 - PaloAlto Command Injection Exploit - HTTP (Request) High
    2025/01/06DDI RULE 5290/vinfo/kr/threat-encyclopedia/network/ddi-rule-5290
    DDI RULE 5297 CVE-2024-49113 - WINDOWS LDAP DOS EXPLOIT - CLDAP(RESPONSE) High
    2025/01/06DDI RULE 5297/vinfo/kr/threat-encyclopedia/network/ddi-rule-5297
    DDI RULE 5295 CVE-2024-50623 - CLEO DIRECTORY TRAVERSAL - HTTP (Request) High
    2025/01/02DDI RULE 5295/vinfo/kr/threat-encyclopedia/network/ddi-rule-5295
    DDI RULE 5288 CVE-2024-46938 - Sitecore Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5288/vinfo/kr/threat-encyclopedia/network/ddi-rule-5288
    DDI RULE 5291 CVE-2024-25153 - Fortra FileCatalyst Workflow Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5291/vinfo/kr/threat-encyclopedia/network/ddi-rule-5291
    DDI RULE 5293 CVE-2024-11320 - Pandora Remote Command Execution Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5293/vinfo/kr/threat-encyclopedia/network/ddi-rule-5293
    DDI RULE 4594 COBALTSTRIKE - HTTP(REQUEST) - Variant 3 High
    2024/12/11DDI RULE 4594/vinfo/kr/threat-encyclopedia/network/ddi-rule-4594
    DDI RULE 4861 COBEACON - DNS (Response) - Variant 3 High
    2024/12/11DDI RULE 4861/vinfo/kr/threat-encyclopedia/network/ddi-rule-4861
    DDI RULE 5253 CVE-2024-29830 - IVANTI SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5253/vinfo/kr/threat-encyclopedia/network/ddi-rule-5253
    DDI RULE 5281 AD File and Directory Discovery - SMB2 (Request) Medium
    2024/12/11DDI RULE 5281/vinfo/kr/threat-encyclopedia/network/ddi-rule-5281
    DDI RULE 5284 CVE-2024-34051 - DOLIBARR AC EXECUTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5284/vinfo/kr/threat-encyclopedia/network/ddi-rule-5284
    DDI RULE 5287 Active Directory Certificate Services Template Discovery- LDAP (Request) High
    2024/12/11DDI RULE 5287/vinfo/kr/threat-encyclopedia/network/ddi-rule-5287
    DDI RULE 5283 CVE-2024-9264 - Grafana SQL Injection Exploit - HTTP (Response) High
    2024/12/10DDI RULE 5283/vinfo/kr/threat-encyclopedia/network/ddi-rule-5283
    DDI RULE 5286 Possible Discovery Using NETSHAREENUM API - SMB2 (Request) High
    2024/12/10DDI RULE 5286/vinfo/kr/threat-encyclopedia/network/ddi-rule-5286
    DDI RULE 4396 CVE-2020-1967 - Signature Algorithms Cert Denial of Service - HTTPS (Request) Medium
    2024/12/09DDI RULE 4396/vinfo/kr/threat-encyclopedia/network/ddi-rule-4396
    DDI RULE 5282 CVE-2024-43451 - WINDOWS NTLM RELAY EXPLOIT - HTTP (Response) High
    2024/12/09DDI RULE 5282/vinfo/kr/threat-encyclopedia/network/ddi-rule-5282
    DDI RULE 5285 CVE-2024-1884 - PAPERCUT SSRF EXPLOIT - HTTP(REQUEST) High
    2024/12/09DDI RULE 5285/vinfo/kr/threat-encyclopedia/network/ddi-rule-5285
    DDI RULE 5279 CVE-2024-47525 - LIBRENMS XSS EXPLOIT - HTTP(REQUEST) High
    2024/12/04DDI RULE 5279/vinfo/kr/threat-encyclopedia/network/ddi-rule-5279
    DDI RULE 5280 CVE-2024-42008 - Roundcube Information Disclosure Exploit - HTTP (Response) High
    2024/12/03DDI RULE 5280/vinfo/kr/threat-encyclopedia/network/ddi-rule-5280
    DDI RULE 5232 CVE-2024-45519 - ZIMBRA RCE EXPLOIT - SMTP (REQUEST) High
    2024/12/02DDI RULE 5232/vinfo/kr/threat-encyclopedia/network/ddi-rule-5232
    DDI RULE 5276 CVE-2024-5010 - WHATSUP GOLD EXPLOIT - HTTP(REQUEST) High
    2024/12/02DDI RULE 5276/vinfo/kr/threat-encyclopedia/network/ddi-rule-5276
    DDI RULE 5278 CVE-2024-0012 - PALO ALTO AUTH BYPASS - HTTP (Request) High
    2024/11/28DDI RULE 5278/vinfo/kr/threat-encyclopedia/network/ddi-rule-5278
    DDI RULE 5267 COVENANT Custom Profile - HTTP (Response) - Variant 2 High
    2024/11/27DDI RULE 5267/vinfo/kr/threat-encyclopedia/network/ddi-rule-5267
    DDI RULE 5274 Covenant Default Named Pipe - SMB2 (Request) High
    2024/11/26DDI RULE 5274/vinfo/kr/threat-encyclopedia/network/ddi-rule-5274
    DDI RULE 5269 SALITY C2 - TCP (REQUEST) High
    2024/11/21DDI RULE 5269/vinfo/kr/threat-encyclopedia/network/ddi-rule-5269
    DDI RULE 5271 CVE-2024-43572 - Microsoft Windows Management Console RCE Exploit - HTTP (Response) High
    2024/11/21DDI RULE 5271/vinfo/kr/threat-encyclopedia/network/ddi-rule-5271
    DDI RULE 5245 CVE-2024-6457 - WORDPRESS EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5245/vinfo/kr/threat-encyclopedia/network/ddi-rule-5245
    DDI RULE 5264 CVE-2024-51567 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5264/vinfo/kr/threat-encyclopedia/network/ddi-rule-5264
    DDI RULE 5268 CVE-2024-7591 - Progress Kemp LoadMaster Command Injection Exploit - HTTP (Request) High
    2024/11/19DDI RULE 5268/vinfo/kr/threat-encyclopedia/network/ddi-rule-5268
    DDI RULE 5256 COVENANT Default - HTTP (Response) High
    2024/11/14DDI RULE 5256/vinfo/kr/threat-encyclopedia/network/ddi-rule-5256
    DDI RULE 5258 CVE-2024-9465 - PALOALTO EXPEDITION EXPLOIT - HTTP (Response) High
    2024/11/14DDI RULE 5258/vinfo/kr/threat-encyclopedia/network/ddi-rule-5258
    DDI RULE 5265 CVE-2024-40711 - VEEAM BACKUP RCE EXPLOIT - TCP (Request) High
    2024/11/14DDI RULE 5265/vinfo/kr/threat-encyclopedia/network/ddi-rule-5265
    DDI RULE 5263 CVE-2024-41874 - ADOBE COLDFUSION RCE EXPLOIT - HTTP (Response) High
    2024/11/13DDI RULE 5263/vinfo/kr/threat-encyclopedia/network/ddi-rule-5263
    DDI RULE 5262 CoreWarrior Exfiltration - HTTP (Request) High
    2024/11/12DDI RULE 5262/vinfo/kr/threat-encyclopedia/network/ddi-rule-5262
    DDI RULE 5259 FAKEWIN - HTTP (Request) High
    2024/11/11DDI RULE 5259/vinfo/kr/threat-encyclopedia/network/ddi-rule-5259
    DDI RULE 5260 RCSHELL BACKDOOR - HTTP (Request) High
    2024/11/11DDI RULE 5260/vinfo/kr/threat-encyclopedia/network/ddi-rule-5260
    DDI RULE 5261 HORUS PROTECTOR C2 - TCP (Response) High
    2024/11/11DDI RULE 5261/vinfo/kr/threat-encyclopedia/network/ddi-rule-5261
    DDI RULE 5257 CVE-2024-28988 - SOLARWINDS RCE EXPLOIT - HTTP (Response) High
    2024/11/07DDI RULE 5257/vinfo/kr/threat-encyclopedia/network/ddi-rule-5257
    DDI RULE 4219 GHOSTMINER - HTTP (Request) High
    2024/11/06DDI RULE 4219/vinfo/kr/threat-encyclopedia/network/ddi-rule-4219
    DDI RULE 4484 GOLDENSPY - HTTP (REQUEST) High
    2024/11/06DDI RULE 4484/vinfo/kr/threat-encyclopedia/network/ddi-rule-4484
    DDI RULE 4572 GLUPTEBA - HTTP (REQUEST) High
    2024/11/06DDI RULE 4572/vinfo/kr/threat-encyclopedia/network/ddi-rule-4572
    DDI RULE 5081 CVE-2024-36401 - GEOSERVER EXPLOIT - HTTP (REQUEST) High
    2024/11/06DDI RULE 5081/vinfo/kr/threat-encyclopedia/network/ddi-rule-5081
    DDI RULE 5139 PYC Download - HTTP (Response) Low
    2024/11/05DDI RULE 5139/vinfo/kr/threat-encyclopedia/network/ddi-rule-5139
    DDI RULE 5140 Python Download - HTTP (Response) Low
    2024/11/05DDI RULE 5140/vinfo/kr/threat-encyclopedia/network/ddi-rule-5140
    DDI RULE 1770 GHOLE - HTTP (Request) High
    2024/11/04DDI RULE 1770/vinfo/kr/threat-encyclopedia/network/ddi-rule-1770
    DDI RULE 5254 Possible Domain Controller List Discovery - DCERPC (Request) High
    2024/11/04DDI RULE 5254/vinfo/kr/threat-encyclopedia/network/ddi-rule-5254
    DDI RULE 5243 WebDAV Successful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5243/vinfo/kr/threat-encyclopedia/network/ddi-rule-5243
    DDI RULE 5244 WebDAV Unsuccessful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5244/vinfo/kr/threat-encyclopedia/network/ddi-rule-5244
    DDI RULE 5249 KeyLogEXE Exfiltration - HTTP (Request) High
    2024/10/28DDI RULE 5249/vinfo/kr/threat-encyclopedia/network/ddi-rule-5249
    DDI RULE 5248 URIVAR EXFILTRATION - HTTP(REQUEST) Low
    2024/10/24DDI RULE 5248/vinfo/kr/threat-encyclopedia/network/ddi-rule-5248
    DDI RULE 5250 C2 SHELLCODE Transfer - HTTP (Response) Low
    2024/10/24DDI RULE 5250/vinfo/kr/threat-encyclopedia/network/ddi-rule-5250
    DDI RULE 5251 REMCOS DOWNLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5251/vinfo/kr/threat-encyclopedia/network/ddi-rule-5251
    DDI RULE 5252 CONOLEATHLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5252/vinfo/kr/threat-encyclopedia/network/ddi-rule-5252
    DDI RULE 1886 Data Exfiltration - DNS (Response) Low
    2024/10/22DDI RULE 1886/vinfo/kr/threat-encyclopedia/network/ddi-rule-1886
    DDI RULE 5238 CVE-2024-32766 - PRIVWIZARD INJECTION EXPLOIT - HTTP (Request) High
    2024/10/22DDI RULE 5238/vinfo/kr/threat-encyclopedia/network/ddi-rule-5238
    DDI RULE 5240 CVE-2024-5932 - WordPress RCE Exploit - HTTP (Request) High
    2024/10/17DDI RULE 5240/vinfo/kr/threat-encyclopedia/network/ddi-rule-5240
    DDI RULE 5231 CVE-2024-32842 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/16DDI RULE 5231/vinfo/kr/threat-encyclopedia/network/ddi-rule-5231
    DDI RULE 5242 CVE-2024-5932 - GIVEWP RCE EXPLOIT - HTTP (Request) High
    2024/10/16DDI RULE 5242/vinfo/kr/threat-encyclopedia/network/ddi-rule-5242
    DDI RULE 5230 CVE-2024-32845 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5230/vinfo/kr/threat-encyclopedia/network/ddi-rule-5230
    DDI RULE 5241 CVE-2024-37397 - Ivanti EPM Improper Restriction of XML External Entity Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5241/vinfo/kr/threat-encyclopedia/network/ddi-rule-5241
    DDI RULE 5239 SYSTEMBC Shellcode Download - HTTP (Response) High
    2024/10/14DDI RULE 5239/vinfo/kr/threat-encyclopedia/network/ddi-rule-5239
    DDI RULE 5229 Advanced Port Scanner - HTTP (Request) High
    2024/10/10DDI RULE 5229/vinfo/kr/threat-encyclopedia/network/ddi-rule-5229
    DDI RULE 5233 CVE-2024-32846 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5233/vinfo/kr/threat-encyclopedia/network/ddi-rule-5233
    DDI RULE 5234 CVE-2024-32843 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5234/vinfo/kr/threat-encyclopedia/network/ddi-rule-5234
    DDI RULE 5235 CVE-2024-34779 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5235/vinfo/kr/threat-encyclopedia/network/ddi-rule-5235
    DDI RULE 5236 CVE-2024-34785 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5236/vinfo/kr/threat-encyclopedia/network/ddi-rule-5236
    DDI RULE 5237 SYSTEMBC C2 - HTTP (Request) High
    2024/10/10DDI RULE 5237/vinfo/kr/threat-encyclopedia/network/ddi-rule-5237
    DDI RULE 5227 VALLEYRAT C2 - TCP (Response) High
    2024/10/09DDI RULE 5227/vinfo/kr/threat-encyclopedia/network/ddi-rule-5227
    DDI RULE 5228 Advanced IP Scanner - HTTP (Request) High
    2024/10/09DDI RULE 5228/vinfo/kr/threat-encyclopedia/network/ddi-rule-5228
    DDI RULE 5225 ONCESVC C2 - HTTP (Response) High
    2024/10/08DDI RULE 5225/vinfo/kr/threat-encyclopedia/network/ddi-rule-5225
    DDI RULE 5226 CVE-2024-6497 - SQUIRLLY EXPLOIT - HTTP (Request) High
    2024/10/08DDI RULE 5226/vinfo/kr/threat-encyclopedia/network/ddi-rule-5226
    DDI RULE 5221 CVE-2024-47177 - CUPS PRINTING RCE EXPLOIT - HTTP (REQUEST) High
    2024/10/03DDI RULE 5221/vinfo/kr/threat-encyclopedia/network/ddi-rule-5221
    DDI RULE 5223 LUMMAC - HTTP (Request) High
    2024/10/03DDI RULE 5223/vinfo/kr/threat-encyclopedia/network/ddi-rule-5223
    DDI RULE 5217 CVE-2024-8190 - Ivanti Cloud Service Appliance Authenticated Command Injection Exploit - HTTP (Response) High
    2024/10/02DDI RULE 5217/vinfo/kr/threat-encyclopedia/network/ddi-rule-5217
    DDI RULE 5222 CVE-2024-2876 - WORDPRESS SQL INJECTION EXPLOIT - HTTP (Request) High
    2024/10/02DDI RULE 5222/vinfo/kr/threat-encyclopedia/network/ddi-rule-5222
    DDI RULE 5218 CVE-2020-8599 - Trend Micro Apex One and OfficeScan Directory Traversal Exploit - HTTP (Request) High
    2024/10/01DDI RULE 5218/vinfo/kr/threat-encyclopedia/network/ddi-rule-5218
    DDI RULE 5219 CVE-2024-38077 - MS RDL RCE EXPLOIT - DCERPC (Request) High
    2024/10/01DDI RULE 5219/vinfo/kr/threat-encyclopedia/network/ddi-rule-5219
    DDI RULE 5220 CVE-2024-6670 - WhatsUp SQL Injection Exploit - HTTP (Response) High
    2024/10/01DDI RULE 5220/vinfo/kr/threat-encyclopedia/network/ddi-rule-5220
    DDI RULE 5216 Possible Generic Database Query - MySQL (Request) Medium
    2024/09/26DDI RULE 5216/vinfo/kr/threat-encyclopedia/network/ddi-rule-5216
    DDI RULE 5206 Remote Access Tool VNC - VNC (Response) High
    2024/09/23DDI RULE 5206/vinfo/kr/threat-encyclopedia/network/ddi-rule-5206
    DDI RULE 5207 Remote Access Tool RealVNC - VNC (Response) High
    2024/09/23DDI RULE 5207/vinfo/kr/threat-encyclopedia/network/ddi-rule-5207
    DDI RULE 5208 Remote Access Tool TightVNC - VNC (Response) High
    2024/09/23DDI RULE 5208/vinfo/kr/threat-encyclopedia/network/ddi-rule-5208
    DDI RULE 5209 Remote Access Tool UltraVNC - VNC (Response) High
    2024/09/23DDI RULE 5209/vinfo/kr/threat-encyclopedia/network/ddi-rule-5209
    DDI RULE 5214 CVE-2024-5505 - NETGEAR TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/09/17DDI RULE 5214/vinfo/kr/threat-encyclopedia/network/ddi-rule-5214
    DDI RULE 5215 CVE-2024-43461 - MSHTML SPOOFING EXPLOIT - HTTP (RESPONSE) High
    2024/09/17DDI RULE 5215/vinfo/kr/threat-encyclopedia/network/ddi-rule-5215
    DDI RULE 5082 CVE-2024-32113 - Apache OFBiz Directory Traversal Exploit - HTTP (Request) High
    2024/09/16DDI RULE 5082/vinfo/kr/threat-encyclopedia/network/ddi-rule-5082
    DDI RULE 5212 CVE-2023-51364 - QNAP RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/12DDI RULE 5212/vinfo/kr/threat-encyclopedia/network/ddi-rule-5212
    DDI RULE 5213 WebP Image Sensor - HTTP (Response) High
    2024/09/12DDI RULE 5213/vinfo/kr/threat-encyclopedia/network/ddi-rule-5213
    DDI RULE 5211 CVE-2023-38205 - Adobe ColdFusion Policy Bypass Exploit - HTTP (Request) High
    2024/09/11DDI RULE 5211/vinfo/kr/threat-encyclopedia/network/ddi-rule-5211
    DDI RULE 5210 Metasploit Web Delivery through PowerShell - HTTP (Response) Medium
    2024/09/10DDI RULE 5210/vinfo/kr/threat-encyclopedia/network/ddi-rule-5210
    DDI RULE 2793 APT - WINNTI - HTTP (Response) High
    2024/09/09DDI RULE 2793/vinfo/kr/threat-encyclopedia/network/ddi-rule-2793
    DDI RULE 5203 CVE-2024-5721 - LOGSIGN RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5203/vinfo/kr/threat-encyclopedia/network/ddi-rule-5203
    DDI RULE 5204 CVE-2024-7928 - FASTADMIN TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5204/vinfo/kr/threat-encyclopedia/network/ddi-rule-5204
    DDI RULE 5205 CVE-2024-29826 - IVANTI ENDPOINT RCE EXPLOIT - HTTP (REQUEST) High
    2024/09/05DDI RULE 5205/vinfo/kr/threat-encyclopedia/network/ddi-rule-5205
    DDI RULE 5097 CVE-2023-27532 - Veeam Backup and Replication Backup Service Authentication Bypass Exploit - TCP (Request) High
    2024/09/04DDI RULE 5097/vinfo/kr/threat-encyclopedia/network/ddi-rule-5097
    DDI RULE 5200 CVE-2024-38652 - IVANTI TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/04DDI RULE 5200/vinfo/kr/threat-encyclopedia/network/ddi-rule-5200
    DDI RULE 5202 MAGICRAT EXFIL - HTTP(REQUEST) High
    2024/09/04DDI RULE 5202/vinfo/kr/threat-encyclopedia/network/ddi-rule-5202
    DDI RULE 4345 EMOTET - HTTP (Request) - Variant 7 High
    2024/09/03DDI RULE 4345/vinfo/kr/threat-encyclopedia/network/ddi-rule-4345
    DDI RULE 5098 JUPITERRAT - HTTP (REQUEST) High
    2024/08/29DDI RULE 5098/vinfo/kr/threat-encyclopedia/network/ddi-rule-5098
    DDI RULE 5099 FAKEBAT DOWNLOADER - HTTP(REQUEST) High
    2024/08/29DDI RULE 5099/vinfo/kr/threat-encyclopedia/network/ddi-rule-5099
    DDI RULE 5090 CVE-2021-26858 - Possible MS Exchange SSRF Exploit - HTTP (Response) Low
    2024/08/28DDI RULE 5090/vinfo/kr/threat-encyclopedia/network/ddi-rule-5090
    DDI RULE 5096 ZOMBIEDROP - HTTP (REQUEST) High
    2024/08/27DDI RULE 5096/vinfo/kr/threat-encyclopedia/network/ddi-rule-5096
    DDI RULE 5075 CVE-2024-49606 - TINYPROXY RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5075/vinfo/kr/threat-encyclopedia/network/ddi-rule-5075
    DDI RULE 5095 CVE-2024-4885 - WHATSUP GOLD TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5095/vinfo/kr/threat-encyclopedia/network/ddi-rule-5095
    DDI RULE 5092 CVE-2024-7120 - RAISECOM COMMAND INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/08/20DDI RULE 5092/vinfo/kr/threat-encyclopedia/network/ddi-rule-5092
    DDI RULE 5093 Prometei C2 - HTTP (Request) High
    2024/08/20DDI RULE 5093/vinfo/kr/threat-encyclopedia/network/ddi-rule-5093
    DDI RULE 5094 Possible STEALBIT Exfiltration - HTTP (Request) Medium
    2024/08/20DDI RULE 5094/vinfo/kr/threat-encyclopedia/network/ddi-rule-5094
    DDI RULE 5091 RUTHENS ENCRYPTION - SMB2 (REQUEST) High
    2024/08/19DDI RULE 5091/vinfo/kr/threat-encyclopedia/network/ddi-rule-5091
    DDI RULE 5087 DAMEWARE RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/15DDI RULE 5087/vinfo/kr/threat-encyclopedia/network/ddi-rule-5087
    DDI RULE 5088 Possible Faker Generated Self-Signed Certificate - HTTPS Medium
    2024/08/14DDI RULE 5088/vinfo/kr/threat-encyclopedia/network/ddi-rule-5088
    DDI RULE 5089 COBEACON Default Named Pipe - SMB2 (Request) - Variant 2 Medium
    2024/08/14DDI RULE 5089/vinfo/kr/threat-encyclopedia/network/ddi-rule-5089
    DDI RULE 5085 CVE-2024-5008 - WHATSUP GOLD RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/13DDI RULE 5085/vinfo/kr/threat-encyclopedia/network/ddi-rule-5085
    DDI RULE 5086 CVE-2019-0708 - Microsoft Windows Remote Desktop Services Remote Code Execution Exploit - TCP (Request) High
    2024/08/13DDI RULE 5086/vinfo/kr/threat-encyclopedia/network/ddi-rule-5086
    DDI RULE 5079 CVE-2023-42000 - Arcserve Unified Data Protection Path Traversal Exploit - HTTP (Request) High
    2024/08/12DDI RULE 5079/vinfo/kr/threat-encyclopedia/network/ddi-rule-5079
    DDI RULE 5084 CVE-2024-4883 - Progress WhatsUp Gold Traversal Exploit - TCP (Request) High
    2024/08/12DDI RULE 5084/vinfo/kr/threat-encyclopedia/network/ddi-rule-5084
    DDI RULE 5072 ADRECON QUERY - LDAP(Request) Low
    2024/08/09DDI RULE 5072/vinfo/kr/threat-encyclopedia/network/ddi-rule-5072
    DDI RULE 5083 CVE-2024-38856 - APACHE OFBIZ RCE EXPLOIT - HTTP (Request) High
    2024/08/09DDI RULE 5083/vinfo/kr/threat-encyclopedia/network/ddi-rule-5083
    DDI RULE 5077 CVE-2024-2863 - LG LED Directory Traversal Exploit - HTTP (Request) High
    2024/08/05DDI RULE 5077/vinfo/kr/threat-encyclopedia/network/ddi-rule-5077
    DDI RULE 5078 CVE-2024-36991 - Splunk Directory Traversal Exploit - HTTP (Response) High
    2024/08/05DDI RULE 5078/vinfo/kr/threat-encyclopedia/network/ddi-rule-5078
    DDI RULE 5074 CVE-2024-5015 - WHATSUP SSRF EXPLOIT - HTTP (REQUEST) High
    2024/08/01DDI RULE 5074/vinfo/kr/threat-encyclopedia/network/ddi-rule-5074
    DDI RULE 5076 CVE-2024-4879 - ServiceNow Template Injection Exploit - HTTP (Response) High
    2024/08/01DDI RULE 5076/vinfo/kr/threat-encyclopedia/network/ddi-rule-5076
    DDI RULE 4886 TRUEBOT - HTTP (REQUEST) - Variant 2 High
    2024/07/31DDI RULE 4886/vinfo/kr/threat-encyclopedia/network/ddi-rule-4886
    DDI RULE 5073 CVE-2024-38112 - MSHTML RCE EXPLOIT - SMB2 (REQUEST) High
    2024/07/31DDI RULE 5073/vinfo/kr/threat-encyclopedia/network/ddi-rule-5073
    DDI RULE 5063 CVE-2024-5806 - MOVEit Authentication Bypass Exploit - HTTP(Request) High
    2024/07/29DDI RULE 5063/vinfo/kr/threat-encyclopedia/network/ddi-rule-5063
    DDI RULE 5067 CVE-2024-4358 - TELERIK AUTHBYPASS EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5067/vinfo/kr/threat-encyclopedia/network/ddi-rule-5067
    DDI RULE 5068 CVE-2024-37389 - APACHE NIFI EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5068/vinfo/kr/threat-encyclopedia/network/ddi-rule-5068
    DDI RULE 5069 PHP DEV EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5069/vinfo/kr/threat-encyclopedia/network/ddi-rule-5069
    DDI RULE 5070 CVE-2024-27348 - APACHE HUGEGRAPH RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5070/vinfo/kr/threat-encyclopedia/network/ddi-rule-5070
    DDI RULE 5071 RC4 Encryption in Pre-Authentication - Kerberos (Request) Medium
    2024/07/25DDI RULE 5071/vinfo/kr/threat-encyclopedia/network/ddi-rule-5071
    DDI RULE 5064 CVE-2024-38112 - MSHTML RCE EXPLOIT - HTTP (RESPONSE) High
    2024/07/24DDI RULE 5064/vinfo/kr/threat-encyclopedia/network/ddi-rule-5064
    DDI RULE 5065 CVE-2024-28995 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5065/vinfo/kr/threat-encyclopedia/network/ddi-rule-5065
    DDI RULE 5066 CVE-2024-4040 - CRUSHFTP RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5066/vinfo/kr/threat-encyclopedia/network/ddi-rule-5066
    DDI RULE 4682 MULTIPLE LATERAL MOVEMENT - SMB2(REQUEST) Low
    2024/07/23DDI RULE 4682/vinfo/kr/threat-encyclopedia/network/ddi-rule-4682
    DDI RULE 5052 CVE-2024-0769 - D-Link Directory Traversal Exploit - HTTP (Response) High
    2024/07/18DDI RULE 5052/vinfo/kr/threat-encyclopedia/network/ddi-rule-5052
    DDI RULE 5059 POSSIBLE KIMSUKY C2 - HTTP (Request) Medium
    2024/07/18DDI RULE 5059/vinfo/kr/threat-encyclopedia/network/ddi-rule-5059
    DDI RULE 5061 CVE-2024-21683 - Atlassian Confluence Server RCE Exploit - HTTP (Request) High
    2024/07/17DDI RULE 5061/vinfo/kr/threat-encyclopedia/network/ddi-rule-5061
    DDI RULE 5027 Telegram Bot API Sensor - HTTP (Response) Medium
    2024/07/16DDI RULE 5027/vinfo/kr/threat-encyclopedia/network/ddi-rule-5027
    DDI RULE 5057 PRIVATELOADER C2 - HTTP (Request) High
    2024/07/16DDI RULE 5057/vinfo/kr/threat-encyclopedia/network/ddi-rule-5057
    DDI RULE 5060 HNAP RCE EXPLOIT - HTTP (Request) High
    2024/07/16DDI RULE 5060/vinfo/kr/threat-encyclopedia/network/ddi-rule-5060
    DDI RULE 5062 CVE-2024-23692 - Rejetto HTTP File Server Command Injection Exploit - HTTP (Response) High
    2024/07/16DDI RULE 5062/vinfo/kr/threat-encyclopedia/network/ddi-rule-5062
    DDI RULE 5053 HTA File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5053/vinfo/kr/threat-encyclopedia/network/ddi-rule-5053
    DDI RULE 5054 HTA File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5054/vinfo/kr/threat-encyclopedia/network/ddi-rule-5054
    DDI RULE 5055 SH File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5055/vinfo/kr/threat-encyclopedia/network/ddi-rule-5055
    DDI RULE 5056 SH File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5056/vinfo/kr/threat-encyclopedia/network/ddi-rule-5056
    DDI RULE 5058 KOI LOADER C2 - HTTP (Request) High
    2024/07/15DDI RULE 5058/vinfo/kr/threat-encyclopedia/network/ddi-rule-5058
    DDI RULE 5047 CVE-2021-20837 - Movable Type XMLRPC Command Injection Exploit - HTTP (Response) High
    2024/07/11DDI RULE 5047/vinfo/kr/threat-encyclopedia/network/ddi-rule-5047
    DDI RULE 5050 ISO File Download Sensor - HTTP (Response) Low
    2024/07/11DDI RULE 5050/vinfo/kr/threat-encyclopedia/network/ddi-rule-5050
    DDI RULE 5049 APT - DARKPINK Exfiltration - SMTP (Request) Medium
    2024/07/10DDI RULE 5049/vinfo/kr/threat-encyclopedia/network/ddi-rule-5049
    DDI RULE 5051 AMADEY C2 - HTTP (Request) High
    2024/07/09DDI RULE 5051/vinfo/kr/threat-encyclopedia/network/ddi-rule-5051
    DDI RULE 4449 Remote Service execution through SMB2 SVCCTL detected - Variant 3 High
    2024/07/05DDI RULE 4449/vinfo/kr/threat-encyclopedia/network/ddi-rule-4449
    DDI RULE 5048 METASPLOIT (Payload) - Reverse HTTP Encrypted - HTTP (Response) Medium
    2024/07/03DDI RULE 5048/vinfo/kr/threat-encyclopedia/network/ddi-rule-5048
    DDI RULE 5046 Exfiltration SSH Private Key - HTTP (Response) High
    2024/06/24DDI RULE 5046/vinfo/kr/threat-encyclopedia/network/ddi-rule-5046
    DDI RULE 5044 CVE-2024-24919 - Check Point Information Disclosure Exploit - HTTP (Response) High
    2024/06/19DDI RULE 5044/vinfo/kr/threat-encyclopedia/network/ddi-rule-5044
    DDI RULE 5045 CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution - HTTP (Request) High
    2024/06/19DDI RULE 5045/vinfo/kr/threat-encyclopedia/network/ddi-rule-5045
    DDI RULE 5033 METASPLOIT (Payload) - Reverse TCP Encrypted - TCP (Response) Medium
    2024/06/13DDI RULE 5033/vinfo/kr/threat-encyclopedia/network/ddi-rule-5033
    DDI RULE 5043 Gomir C2 - HTTP (Request) High
    2024/06/04DDI RULE 5043/vinfo/kr/threat-encyclopedia/network/ddi-rule-5043
    DDI RULE 5042 CVE-2024-4956 - Nexus Repository 3 Path Traversal Exploit - HTTP (Response) High
    2024/05/30DDI RULE 5042/vinfo/kr/threat-encyclopedia/network/ddi-rule-5042
    DDI RULE 5035 JSOUTPROX - HTTP (REQUEST) High
    2024/05/29DDI RULE 5035/vinfo/kr/threat-encyclopedia/network/ddi-rule-5035
    DDI RULE 5037 CVE-2024-3272 - D-LINK NAS devices Hardcoded Credential Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5037/vinfo/kr/threat-encyclopedia/network/ddi-rule-5037
    DDI RULE 5038 CVE-2024-3273 - D-LINK NAS devices Command Injection Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5038/vinfo/kr/threat-encyclopedia/network/ddi-rule-5038
    DDI RULE 5039 SOAP API RCE - HTTP (Request) High
    2024/05/29DDI RULE 5039/vinfo/kr/threat-encyclopedia/network/ddi-rule-5039
    DDI RULE 5040 DLINK RCE - HTTP (Request) High
    2024/05/29DDI RULE 5040/vinfo/kr/threat-encyclopedia/network/ddi-rule-5040
    DDI RULE 5041 IDB EXFILTRATION - HTTP(REQUEST) High
    2024/05/29DDI RULE 5041/vinfo/kr/threat-encyclopedia/network/ddi-rule-5041
    DDI RULE 5031 CVE-2022-30333 - RARLab UnRAR Directory Traversal Exploit - HTTP (Response) High
    2024/05/27DDI RULE 5031/vinfo/kr/threat-encyclopedia/network/ddi-rule-5031
    DDI RULE 5034 TINYNUKE DOWNLOADER - HTTP (REQUEST) High
    2024/05/27DDI RULE 5034/vinfo/kr/threat-encyclopedia/network/ddi-rule-5034
    DDI RULE 5036 MELTED Hidden VNC - TCP (REQUEST) High
    2024/05/27DDI RULE 5036/vinfo/kr/threat-encyclopedia/network/ddi-rule-5036
    DDI RULE 5032 Copy BAT Files - SMB2 (Request) Low
    2024/05/21DDI RULE 5032/vinfo/kr/threat-encyclopedia/network/ddi-rule-5032
    DDI RULE 5030 MIMIC C2 - HTTP (Request) Medium
    2024/05/15DDI RULE 5030/vinfo/kr/threat-encyclopedia/network/ddi-rule-5030
    DDI RULE 4887 COBALTSTRIKE - HTTP (REQUEST) - Variant 4 High
    2024/05/09DDI RULE 4887/vinfo/kr/threat-encyclopedia/network/ddi-rule-4887
    DDI RULE 5028 EVILPROXY - HTTP (Response) High
    2024/05/07DDI RULE 5028/vinfo/kr/threat-encyclopedia/network/ddi-rule-5028
    DDI RULE 5024 CVE-2024-31138 - JetBrains TeamCity Cross-Site Scripting Exploit - HTTP (Request) High
    2024/05/06DDI RULE 5024/vinfo/kr/threat-encyclopedia/network/ddi-rule-5024
    DDI RULE 5025 CVE-2024-24401 - Nagios XI SQL Injection Exploit - HTTP (Response) High
    2024/05/06DDI RULE 5025/vinfo/kr/threat-encyclopedia/network/ddi-rule-5025
    DDI RULE 5026 POSSIBLE GOOTLOADER C2 - HTTP (Response) Medium
    2024/05/06DDI RULE 5026/vinfo/kr/threat-encyclopedia/network/ddi-rule-5026
    DDI RULE 5023 BATLOADER C2 - HTTP (Request) Medium
    2024/04/29DDI RULE 5023/vinfo/kr/threat-encyclopedia/network/ddi-rule-5023
    DDI RULE 5021 CVE-2023-48788 - FortiClientEMS SQL Injection Exploit - TCP (Request) High
    2024/04/18DDI RULE 5021/vinfo/kr/threat-encyclopedia/network/ddi-rule-5021
    DDI RULE 5022 CVE-2024-3400 - Palo Alto Command Injection Exploit - HTTP (Request) High
    2024/04/17DDI RULE 5022/vinfo/kr/threat-encyclopedia/network/ddi-rule-5022
    DDI RULE 5020 BUNNYLOADER - HTTP (REQUEST) High
    2024/04/15DDI RULE 5020/vinfo/kr/threat-encyclopedia/network/ddi-rule-5020
    DDI RULE 5017 CVE-2024-20767 - Cold Fusion Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5017/vinfo/kr/threat-encyclopedia/network/ddi-rule-5017
    DDI RULE 5018 CVE-2023-32315 - Ignite Realtime Openfire Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5018/vinfo/kr/threat-encyclopedia/network/ddi-rule-5018
    DDI RULE 5019 CVE-2023-42793 - Teamcity Server - HTTP(Response) High
    2024/04/08DDI RULE 5019/vinfo/kr/threat-encyclopedia/network/ddi-rule-5019
    DDI RULE 5016 Raccoon Stealer - HTTP (Request) High
    2024/04/02DDI RULE 5016/vinfo/kr/threat-encyclopedia/network/ddi-rule-5016
    DDI RULE 5015 COMEBACKER - HTTP (Request) High
    2024/04/01DDI RULE 5015/vinfo/kr/threat-encyclopedia/network/ddi-rule-5015
    DDI RULE 5014 APT - LOOKBACK - TCP (Request) High
    2024/03/25DDI RULE 5014/vinfo/kr/threat-encyclopedia/network/ddi-rule-5014
    DDI RULE 5013 Default GUID on External IP - SMB2 (Response) High
    2024/03/14DDI RULE 5013/vinfo/kr/threat-encyclopedia/network/ddi-rule-5013
    DDI RULE 5005 APT - LOOKBACK - TCP (Response) High
    2024/03/11DDI RULE 5005/vinfo/kr/threat-encyclopedia/network/ddi-rule-5005
    DDI RULE 5011 CVE-2024-27198 - JetBrains TeamCity Auth Bypass Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5011/vinfo/kr/threat-encyclopedia/network/ddi-rule-5011
    DDI RULE 5012 CVE-2024-27199 - JetBrains TeamCity Directory Traversal Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5012/vinfo/kr/threat-encyclopedia/network/ddi-rule-5012
    DDI RULE 5010 NTLM Challenge from External IP Address - SMB2 (Response) Medium
    2024/03/07DDI RULE 5010/vinfo/kr/threat-encyclopedia/network/ddi-rule-5010
    DDI RULE 4923 Splashtop Business Access Remote Desktop RMM - DNS (Response) Low
    2024/03/05DDI RULE 4923/vinfo/kr/threat-encyclopedia/network/ddi-rule-4923
    DDI RULE 4999 CVE-2023-48365 - Qlik HTTP Smuggling - HTTP (Response) Medium
    2024/02/27DDI RULE 4999/vinfo/kr/threat-encyclopedia/network/ddi-rule-4999
    DDI RULE 5001 TeamViewer RMM - UDP (Request) Medium
    2024/02/26DDI RULE 5001/vinfo/kr/threat-encyclopedia/network/ddi-rule-5001
    DDI RULE 5002 TeamViewer RMM - DNS (Response) Medium
    2024/02/26DDI RULE 5002/vinfo/kr/threat-encyclopedia/network/ddi-rule-5002
    DDI RULE 5008 CVE-2023-41265 - QLIK Request Tunneling Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5008/vinfo/kr/threat-encyclopedia/network/ddi-rule-5008
    DDI RULE 5009 CVE-2023-41266 - QLIK Directory Traversal Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5009/vinfo/kr/threat-encyclopedia/network/ddi-rule-5009
    DDI RULE 5006 CVE-2024-1708 - ConnectWise ScreenConnect Directory Traversal Exploit - HTTP (Request) High
    2024/02/23DDI RULE 5006/vinfo/kr/threat-encyclopedia/network/ddi-rule-5006
    DDI RULE 5007 CVE-2024-1709 - ConnectWise ScreenConnect Authentication Bypass Exploit - HTTP (Response) High
    2024/02/23DDI RULE 5007/vinfo/kr/threat-encyclopedia/network/ddi-rule-5007
    DDI RULE 5003 CVE-2024-22024 - Ivanti Connect Secure & Policy Secure Authentication Bypass Exploit - HTTP (Request) High
    2024/02/22DDI RULE 5003/vinfo/kr/threat-encyclopedia/network/ddi-rule-5003
    DDI RULE 5004 SuperOps RMM Sensor - DNS (Response) Low
    2024/02/22DDI RULE 5004/vinfo/kr/threat-encyclopedia/network/ddi-rule-5004
    DDI RULE 4996 CVE-2024-21893 - Ivanti Connect Secure & Policy Secure Gateways Server-Side Request Forgery Exploit - HTTP (Request) High
    2024/02/19DDI RULE 4996/vinfo/kr/threat-encyclopedia/network/ddi-rule-4996
    DDI RULE 4998 DARKME - TCP (Request) High
    2024/02/15DDI RULE 4998/vinfo/kr/threat-encyclopedia/network/ddi-rule-4998
    DDI RULE 5000 GhostLocker Exfiltration - HTTP (Request) High
    2024/02/15DDI RULE 5000/vinfo/kr/threat-encyclopedia/network/ddi-rule-5000
    DDI RULE 4995 CVE-2023-46805 - Ivanti Connect Secure & Policy Secure Gateways Authentication Bypass Exploit - HTTP (Response) High
    2024/02/12DDI RULE 4995/vinfo/kr/threat-encyclopedia/network/ddi-rule-4995
    DDI RULE 4997 CVE-2024-23897 - Jenkins Authentication Bypass Exploit - HTTP (Request) High
    2024/02/12DDI RULE 4997/vinfo/kr/threat-encyclopedia/network/ddi-rule-4997
    DDI RULE 4994 CVE-2024-0204 - Fortra GoAnywhere MFT AuthBypass Exploit - HTTP(Request) High
    2024/02/01DDI RULE 4994/vinfo/kr/threat-encyclopedia/network/ddi-rule-4994
    DDI RULE 4973 Possible Encryption Downgrade Attack - Kerberos (Response) Medium
    2024/01/31DDI RULE 4973/vinfo/kr/threat-encyclopedia/network/ddi-rule-4973
    DDI RULE 4992 CVE-2023-32252 - Linux Kernel ksmbd NULL Pointer Exploit - SMB2 (Request) High
    2024/01/31DDI RULE 4992/vinfo/kr/threat-encyclopedia/network/ddi-rule-4992
    DDI RULE 4986 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Response) Medium
    2024/01/29DDI RULE 4986/vinfo/kr/threat-encyclopedia/network/ddi-rule-4986
    DDI RULE 4991 PIKABOT EXFIL - HTTP (Request) High
    2024/01/29DDI RULE 4991/vinfo/kr/threat-encyclopedia/network/ddi-rule-4991
    DDI RULE 4993 MAGIC HOUND SOAP - HTTP(Request) High
    2024/01/29DDI RULE 4993/vinfo/kr/threat-encyclopedia/network/ddi-rule-4993
    DDI RULE 4974 HAVOC - HTTP (Request) High
    2024/01/25DDI RULE 4974/vinfo/kr/threat-encyclopedia/network/ddi-rule-4974
    DDI RULE 4990 CVE-2023-22527 - Atlassian OGNL Injection Exploit - HTTP (Request) High
    2024/01/25DDI RULE 4990/vinfo/kr/threat-encyclopedia/network/ddi-rule-4990
    DDI RULE 4987 TPRC - HTTP (Request) High
    2024/01/24DDI RULE 4987/vinfo/kr/threat-encyclopedia/network/ddi-rule-4987
    DDI RULE 4988 CVE-2023-46805 - Ivanti Connect Secure and Policy Secure Gateways Authentication Bypass Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4988/vinfo/kr/threat-encyclopedia/network/ddi-rule-4988
    DDI RULE 4989 CVE-2024-21887 - Ivanti Connect Secure and Policy Secure Gateways Command Injection Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4989/vinfo/kr/threat-encyclopedia/network/ddi-rule-4989
    DDI RULE 4859 ZIP TLD MOVED - HTTP(RESPONSE) High
    2024/01/23DDI RULE 4859/vinfo/kr/threat-encyclopedia/network/ddi-rule-4859
    DDI RULE 4984 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP (REQUEST) - Variant 2 High
    2024/01/22DDI RULE 4984/vinfo/kr/threat-encyclopedia/network/ddi-rule-4984
    DDI RULE 4985 CVE-2023-46604 - Apache ActiveMQ RCE Exploit - TCP (Request) High
    2024/01/22DDI RULE 4985/vinfo/kr/threat-encyclopedia/network/ddi-rule-4985
    DDI RULE 4983 Micosoft Windows SmartScreen Exploit(ZDI-CAN-23100) - HTTP(Response) High
    2024/01/18DDI RULE 4983/vinfo/kr/threat-encyclopedia/network/ddi-rule-4983
    DDI RULE 4982 COPY FILES - SMB2(REQUEST) High
    2024/01/16DDI RULE 4982/vinfo/kr/threat-encyclopedia/network/ddi-rule-4982
    DDI RULE 4975 CVE-2023-51467- Apache OFBiz Pre-Auth RCE Exploit - HTTP (Response) High
    2024/01/11DDI RULE 4975/vinfo/kr/threat-encyclopedia/network/ddi-rule-4975
    DDI RULE 4976 SYSTEM INFORMATION DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4976/vinfo/kr/threat-encyclopedia/network/ddi-rule-4976
    DDI RULE 4977 TRUSTED DOMAIN DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4977/vinfo/kr/threat-encyclopedia/network/ddi-rule-4977
    DDI RULE 4978 PASSWORD POLICY DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4978/vinfo/kr/threat-encyclopedia/network/ddi-rule-4978
    DDI RULE 4979 PERMISSION GROUP DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4979/vinfo/kr/threat-encyclopedia/network/ddi-rule-4979
    DDI RULE 4980 SYSTEM OWNER DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4980/vinfo/kr/threat-encyclopedia/network/ddi-rule-4980
    DDI RULE 4981 ACCOUNT DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4981/vinfo/kr/threat-encyclopedia/network/ddi-rule-4981
    DDI RULE 4972 PIKABOT DLL Dropper - HTTP (Request) Medium
    2024/01/10DDI RULE 4972/vinfo/kr/threat-encyclopedia/network/ddi-rule-4972
    DDI RULE 4968 Remcos - TCP Medium
    2024/01/03DDI RULE 4968/vinfo/kr/threat-encyclopedia/network/ddi-rule-4968
    DDI RULE 4969 Fonelab - Certificate - HTTPS Medium
    2024/01/03DDI RULE 4969/vinfo/kr/threat-encyclopedia/network/ddi-rule-4969
    DDI RULE 4970 CVE-2021-20016 - SonicWall SSLVPN SMA100 SQL Injection Exploit - HTTP (Request) High
    2024/01/03DDI RULE 4970/vinfo/kr/threat-encyclopedia/network/ddi-rule-4970
    DDI RULE 4971 APT CONN - UDP(REQUEST) High
    2024/01/02DDI RULE 4971/vinfo/kr/threat-encyclopedia/network/ddi-rule-4971
    DDI RULE 4928 CVE-2023-2914 - Rockwell Automation ThinManager ThinServer Type 13 Synchronization Integer Overflow Exploit - TCP (Request) High
    2023/12/21DDI RULE 4928/vinfo/kr/threat-encyclopedia/network/ddi-rule-4928
    DDI RULE 4967 CVE-2023-50164 - Apace Struts2 Path Traversal Exploit - HTTP (Request) High
    2023/12/19DDI RULE 4967/vinfo/kr/threat-encyclopedia/network/ddi-rule-4967
    DDI RULE 4965 LVRAN - HTTP (Request) High
    2023/12/18DDI RULE 4965/vinfo/kr/threat-encyclopedia/network/ddi-rule-4965
    DDI RULE 4966 BIGIP TMSH Path Exploit - HTTP (Response) Medium
    2023/12/14DDI RULE 4966/vinfo/kr/threat-encyclopedia/network/ddi-rule-4966
    DDI RULE 4949 CVE-2023-46747 - BIGIP Smug Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4949/vinfo/kr/threat-encyclopedia/network/ddi-rule-4949
    DDI RULE 4962 BRUTEFORCE - SMB(RESPONSE) High
    2023/12/12DDI RULE 4962/vinfo/kr/threat-encyclopedia/network/ddi-rule-4962
    DDI RULE 4964 CVE-2023-49070 - Apache OFBiz Pre-Auth RCE Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4964/vinfo/kr/threat-encyclopedia/network/ddi-rule-4964
    DDI RULE 4963 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP(REQUEST) High
    2023/12/11DDI RULE 4963/vinfo/kr/threat-encyclopedia/network/ddi-rule-4963
    DDI RULE 4958 POSSIBLE TUNNELING - DNS (Response) - Variant 2 Low
    2023/12/05DDI RULE 4958/vinfo/kr/threat-encyclopedia/network/ddi-rule-4958
    DDI RULE 4959 COBEACON C2 - HTTP(RESPONSE) Medium
    2023/12/05DDI RULE 4959/vinfo/kr/threat-encyclopedia/network/ddi-rule-4959
    DDI RULE 4961 TRAMPIKABOT - HTTP(REQUEST) High
    2023/12/05DDI RULE 4961/vinfo/kr/threat-encyclopedia/network/ddi-rule-4961
    DDI RULE 4930 RHYSIDA - SMB2 (Request) High
    2023/11/30DDI RULE 4930/vinfo/kr/threat-encyclopedia/network/ddi-rule-4930
    DDI RULE 4960 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Request) Medium
    2023/11/30DDI RULE 4960/vinfo/kr/threat-encyclopedia/network/ddi-rule-4960
    DDI RULE 4956 CVE-2023-47246 - SYSAID TRAVERSAL EXPLOIT - HTTP (Request) High
    2023/11/22DDI RULE 4956/vinfo/kr/threat-encyclopedia/network/ddi-rule-4956
    DDI RULE 4957 CVE-2023-4634 - Wordpress Plugin Media-Library-Assistant RCE Exploit - HTTP (Request) High
    2023/11/22DDI RULE 4957/vinfo/kr/threat-encyclopedia/network/ddi-rule-4957
    DDI RULE 4879 Possible CVE-2021-27876 - Veritas RCE Exploit - TCP (Response) Low
    2023/11/21DDI RULE 4879/vinfo/kr/threat-encyclopedia/network/ddi-rule-4879
    DDI RULE 4894 CVE-2023-28771 - Zyxel RCE Exploit - UDP (Request) High
    2023/11/21DDI RULE 4894/vinfo/kr/threat-encyclopedia/network/ddi-rule-4894
    DDI RULE 4952 APT CONN - TCP(REQUEST) High
    2023/11/20DDI RULE 4952/vinfo/kr/threat-encyclopedia/network/ddi-rule-4952
    DDI RULE 4954 CVE-2022-42475 - Fortinet FortiOS SSL-VPN Buffer Overflow Exploit - HTTP (Request) High
    2023/11/20DDI RULE 4954/vinfo/kr/threat-encyclopedia/network/ddi-rule-4954
    DDI RULE 4955 PIKABOT - Malicious Certificate - HTTPS High
    2023/11/20DDI RULE 4955/vinfo/kr/threat-encyclopedia/network/ddi-rule-4955
    DDI RULE 4935 ANOMALIES - HTTP(REQUEST) Medium
    2023/11/16DDI RULE 4935/vinfo/kr/threat-encyclopedia/network/ddi-rule-4935
    DDI RULE 4942 CVE-2023-4966 - NetScaler ADC and Gateway Buffer Overflow Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4942/vinfo/kr/threat-encyclopedia/network/ddi-rule-4942
    DDI RULE 4944 CVE-2023-28288 - MS Sharepoint Information Disclosure Exploit - HTTP(Request) High
    2023/11/16DDI RULE 4944/vinfo/kr/threat-encyclopedia/network/ddi-rule-4944
    DDI RULE 4947 GOOTLOADER XMLRPC - HTTP (Request) High
    2023/11/16DDI RULE 4947/vinfo/kr/threat-encyclopedia/network/ddi-rule-4947
    DDI RULE 4953 CVE-2023-20198 - Cisco IOS XE WebUI Authentication Bypass Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4953/vinfo/kr/threat-encyclopedia/network/ddi-rule-4953
    DDI RULE 4913 CVE-2023-40044 - WS FTP RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4913/vinfo/kr/threat-encyclopedia/network/ddi-rule-4913
    DDI RULE 4936 CVE-2023-29516 - XWIKI RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4936/vinfo/kr/threat-encyclopedia/network/ddi-rule-4936

    30일간 트렌드마이크로 서비스 무료로 사용해 보기

    • 무료 평가판 지금 시작

    리소스

    • 블로그
    • 뉴스룸
    • 위협 보고서
    • DevOps 리소스 센터
    • CISO 리소스 센터
    • 파트너 찾기

    지원

    • Business Support Portal
    • 문의
    • 다운로드
    • 무료 평가판

    트렌드마이크로 정보

    • 당사 소개
    • 인재 채용
    • 위치
    • 이벤트 안내
    • Trust Center

    국가별 본사

    트렌드마이크로 - 한국

    테헤란로 508 해성 2빌딩 15층
    (06178) 서울 강남구

    전화: +82-2-561-0990

    국가 / 지역 선택

    close

    아메리카

    • 미국
    • 브라질
    • 캐나다
    • 멕시코

    중동 & 아프리카

    • 남아프리카공화국
    • 중동 및 북아프리카

    유럽

    • 벨기에
    • 체코
    • 덴마크
    • 독일, 스위스
    • 스페인
    • 프랑스
    • 아일랜드
    • 이탈리아
    • 네덜란드
    • 노르웨이
    • 폴란드
    • 핀란드
    • 스웨덴
    • 터키
    • 영국

    아시아 & 태평양

    • 호주
    • 중앙 아시아
    • 홍콩(영어)
    • 홍콩
    • 인도
    • 인도네시아
    • 일본
    • 대한민국
    • 말레이시아
    • 몽골, 조지아
    • 뉴질랜드
    • 필리핀
    • 싱가포르
    • 대만
    • 태국
    • 베트남

    개인정보보호 | 법률 | 접근성 | 사이트 맵

    Copyright ©2024 Trend Micro Incorporated. All rights reserved.