企業

search close
  • 解決方案
    • 依挑戰
      • 依挑戰
        • 依挑戰
          進一步了解
      • 了解、判斷優先次序,並且防範風險
        • 了解、判斷優先次序,並且防範風險

          藉由受攻擊面管理來改善您的曝險狀況。

          進一步了解
      • 保護雲端原生應用程式
        • 保護雲端原生應用程式

          能支援業務發展的防護。

          進一步了解
      • 保護您的混合環境
        • 保護您的混合、多重雲端環境

          採用防護來掌握可視性並達成業務需求。

          進一步了解
      • 保護您無疆界的人力
        • 保護您無疆界的人力

          安心從任何地點、任何裝置進行連線。

          進一步了解
      • 消除網路盲點
        • 消除網路盲點

          保護您整個環境的使用者與關鍵作業。

          進一步了解
      • 掌握更多資訊、更快回應
        • 掌握更多資訊、更快回應

          善用專為特定用途打造的強大 XDR、受攻擊面風險管理,以及零信任功能,讓您領先敵人一步。

          進一步了解
      • 強化您的團隊
        • 強化您的團隊 敏捷的應對威脅

          藉由主動降低風險以及託管式服務來發揮最大效用。

          進一步了解
      • 將零信任融入營運當中
        • 將零信任融入營運當中

          了解您的受攻擊面、即時評估您的風險,並且從單一主控台來調整您網路、工作負載及裝置的政策。

          進一步了解
    • 依角色
      • 依角色
        • 依角色
          進一步了解
      • 資安長
        • 資安長

          藉由可衡量的網路資安成果來創造商業價值。

          進一步了解
      • SOC 主管
        • SOC 經理

          掌握更多資訊、更快採取行動。

          進一步了解
      • 基礎架構主管
        • 基礎架構主管

          經由資安演進來迅速有效地防範威脅。

          進一步了解
      • 雲端建構人員與開發人員
        • 雲端建構人員與開發人員

          確保程式碼能正常運作。

          進一步了解
      • 雲端資安營運
        • 雲端資安營運

          採用專為雲端環境設計的防護來取得可視性與控管能力。

          進一步了解
    • 依產業別
      • 依產業別
        • 依產業別
          進一步了解
      • 醫療
        • 醫療

          保護病患資料、裝置及網路,同時達成法規要求。

          進一步了解
      • 製造
        • 製造

          保護您的工廠環境,從傳統裝置到最先進的基礎架構。

          進一步了解
      • 石油及天然氣
        • 石油及天然氣

          專為石油及天然氣公共事業設計的 ICS/OT Security。

          進一步了解
      • 電力公司
        • 電力公司

          專為電力公司設計的 ICT/OT Security。

          進一步了解
      • 汽車
        • 汽車
          進一步了解
      • 5G 網路
        • 5G 網路
          進一步了解
    • 中小企業防護
      • 中小企業防護

        透過全面的防護阻止威脅

        進一步了解
  • 平台
    • Vision One 平台
      • Vision One 平台
        • Trend Vision One
          我們的全方位平台

          跨越威脅防護與資安風險管理之間的鴻溝

          進一步了解
      • AI Companion
        • Trend Vision One Companion

          您的生成式 AI 網路資安助理

          進一步了解
    • 攻擊面管理
      • 攻擊面管理

        在資安事件發生之前預先加以阻止

        進一步了解
    • XDR (延伸式偵測及回應)
      • XDR (延伸式偵測及回應)

        從單一平台獲得更寬廣的視野與更豐富的情境資訊來追蹤、偵測、調查及回應威脅,進而更快攔截敵人。

        進一步了解
    • 雲端防護
      • 雲端防護
        • Trend Vision One™
          雲端防護總覽

          最受信賴且專為開發人員、資安團隊及企業設計的雲端防護平台。

          進一步了解
      • 雲端攻擊面風險管理
        • 雲端攻擊面風險管理

          將雲端資產發掘、漏洞優先次序判斷、雲端資安狀況管理,以及攻擊面管理全部集合在一起

          進一步了解
      • 適用雲端的 XDR
        • 適用雲端的 XDR

          將可視性延伸至雲端並簡化 SOC 調查工作。

          進一步了解
      • Workload Security
        • Workload Security

          採用一套具備 CNAPP 功能的雲端防護平台來保護您的資料中心、雲端和容器而不犧牲效能或資安。

          進一步了解
      • Container Security
        • Container Security

          採用進階容器映像掃描、政策導向核准控管以及容器執行時期防護來簡化您的雲端原生應用程式防護。

          進一步了解
      • File Security
        • File Security

          保護應用程式流程與雲端儲存以防範進階威脅。

          進一步了解
    • Endpoint Security
      • Endpoint Security
        • 端點防護總覽

          在攻擊的每一個階段保護端點。

          進一步了解
      • 適用端點的 XDR
        • 適用端點的 XDR

          從單一平台獲得更寬廣的視野與更豐富的情境資訊來追蹤、偵測、調查及回應威脅,進而更快攔截敵人。

          進一步了解
      • Workload Security
        • Workload Security

          專為端點、伺服器及雲端工作負載最佳化的預防、偵測及回應。

          進一步了解
      • 工業端點防護
        • 工業端點防護
          進一步了解
      • 行動安全防護
        • 行動安全防護

          企業內及雲端惡意程式防護、惡意應用程式防護與其他行動威脅防護。

          進一步了解
    • Network Security 網路防護
      • Network Security 網路防護
        • 網路防護總覽

          藉由網路偵測及回應來拓展 XDR 功能。

          進一步了解
      • 適用網路的 XDR
        • 適用網路的 XDR

          從單一平台獲得更寬廣的視野與更豐富的情境資訊來追蹤、偵測、調查及回應威脅,進而更快攔截敵人。

          進一步了解
      • 網路入侵防護 (IPS)
        • 網路入侵防護 (IPS)

          防範您網路內已知、未知及未公開的漏洞。

          進一步了解
      • 入侵偵測系統 (BDS)
        • 入侵偵測系統 (BDS)

          偵測及回應對內、對外及橫向擴散的針對性攻擊。

          進一步了解
      • 安全服務邊緣 (SSE)
        • 安全服務邊緣 (SSE)

          藉由持續的風險評估,重新定義信任與安全的數位轉型。

          進一步了解
      • 工業網路防護
        • 工業網路防護
          進一步了解
      • 5G 網路防護
        • 5G 網路防護
          進一步了解
    • 電子郵件防護
      • 電子郵件防護
        • 電子郵件防護

          攔截網路釣魚、惡意程式、勒索病毒、詐騙,並防範針對性攻擊滲透您的企業。

          進一步了解
      • Email and Collaboration Security
        • Trend Vision One™
          Email and Collaboration Security

          攔截任何電子郵件服務上的網路釣魚、勒索病毒以及針對性攻擊,包括 Microsoft 365 與 Google Workspace。

          進一步了解
    • OT 防護
      • OT 防護
        • OT 防護

          了解專為 ICS 與 OT 設計的資安解決方案。

          進一步了解
      • 適用 OT 的 XDR
        • 適用 OT 的 XDR

          從單一平台獲得更寬廣的視野與更豐富的情境資訊來追蹤、偵測、調查及回應威脅,進而更快攔截敵人。

          進一步了解
      • 工業端點防護
        • 工業端點防護
          進一步了解
      • 工業網路防護
        • 工業網路防護
          工業網路防護
    • Threat Insights
      • Threat Insights

        提前知曉威脅來臨。

        進一步了解
    • Identity Security
      • Identity Security

        端對端的身分防護,從身分狀況管理到偵測及回應。

        進一步了解
    • On-Premises Data Sovereignty
      • 企業內資料主權

        在不犧牲資料主權的情況下防範、偵測、回應及防護。

        進一步了解
    • 所有產品、服務及試用
      • 所有產品、服務及試用
        進一步了解
  • 研究報告
    • 研究報告
      • 部落格
        • 部落格
          進一步了解
      • 年度預測與資安報告(中文版)
        • 年度預測與資安報告(中文版)
          進一步了解
      • 研究報告、新聞與觀點
        • 研究報告、新聞與觀點
          進一步了解
      • 研究與分析
        • 研究與分析
          進一步了解
      • 資安新聞
        • 資安新聞
          進一步了解
      • ZDI 漏洞懸賞計畫
        • ZDI 漏洞懸賞計畫
          進一步了解
  • 部落格
    • 部落格
      • 部落格
        進一步了解
  • 服務
    • 我們的服務
      • Managed XDR
        • Managed XDR

          採用專家託管式偵測及回應 (MDR) 來強化威脅偵測,掌握電子郵件、端點、伺服器、雲端工作負載以及網路的威脅

          進一步了解
      • 支援服務
        • 支援服務
          進一步了解
  • 合作夥伴
    • 合作夥伴方案
      • 合作夥伴方案
        • 合作夥伴方案簡介

          採用最優異的全方位多層式防護來安心拓展您的業務並保護您的客戶。

          進一步了解
      • 雲端服務供應商
        • 雲端服務供應商

          在您的雲端服務陣容當中加入市場領先的資安防護,不論您使用何種平台。

          進一步了解
    • 策略聯盟夥伴
      • 策略聯盟夥伴
        • 策略聯盟總覽

          我們與最頂尖的廠商合作來協助您創造最大的績效與價值。

          進一步了解
      • 我們的策略聯盟夥伴
        • 我們的策略聯盟夥伴
          進一步了解
    • 合作夥伴工具
      • 合作夥伴工具
        • 合作夥伴工具
          進一步了解
      • 合作夥伴登入
        • 合作夥伴登入
          登入
      • 教育訓練與認證
        • 教育訓練與認證
          進一步了解
      • 合作夥伴案例
        • 合作夥伴案例
          進一步了解
      • 代理商
        • 代理商
          進一步了解
      • 尋找合作夥伴
        • 尋找合作夥伴
          進一步了解
  • 公司
    • 為何選擇趨勢科技?
      • 為何選擇趨勢科技?
        • 為何選擇趨勢科技?
          進一步了解
      • 客戶成功故事
        • 客戶成功故事
          進一步了解
      • 產業榮耀
        • 產業榮耀
          進一步了解
      • 策略聯盟
        • 策略聯盟
          進一步了解
      • 人與人的連結
        • 人與人的連結
          進一步了解
    • 關於我們
      • 關於我們
        • 關於我們
          進一步了解
      • Trust Center
        • Trust Center
          進一步了解
      • 歷史沿革
        • 歷史沿革
          進一步了解
      • 多樣性、公平性與包容性
        • 多樣性、公平性與包容性
          進一步了解
      • 企業社會責任
        • 企業社會責任
          進一步了解
      • 經營團隊
        • 經營團隊
          進一步了解
      • 資安專家
        • 資安專家
          進一步了解
      • 網路安全與網路資安教育
        • 網路安全與網路資安教育
          進一步了解
      • 法律資訊
        • 法律資訊
          進一步了解
      • 投資人
        • 投資人
          進一步了解
      • Formula E 賽事
        • Formula E 賽事
          進一步了解
    • 參考資源
      • 新聞中心
        • 新聞中心
          進一步了解
      • 展覽與研討會
        • 展覽與研討會
          進一步了解
      • 徵才
        • 徵才
          進一步了解
      • 企業電子報
        • 訂閱企業電子報
          進一步了解
    • 趨勢科技與競爭對手比較
      • 趨勢科技與競爭對手比較
        • 趨勢科技與競爭對手比較

          看看趨勢科技如何勝過競爭對手

          讓我們開始吧
      • 對比 CrowdStrike
        • 趨勢科技對比 Crowdstrike

          Crowdstrike 經由其雲端原生平台提供了有效的資安防護,但價格卻可能超出企業的預算,尤其是追求成本效益及擴充性的企業,他們想要的是一套真正的單一平台。

          讓我們開始吧
      • 對比 Microsoft
        • 趨勢科技對上 Microsoft

          Microsoft 提供了一層基礎的防護,但通常需要搭配一些解決方案來加以補強,才能徹底解決客戶的資安問題。

          讓我們開始吧
      • 對比 Palo Alto Networks
        • 趨勢科技對比 Palo Alto Networks

          Palo Alto Networks 提供了進階的網路資安解決方案,但其整套方案了解起來卻相當複雜,而且要解鎖其所有功能需要相當多的投資。

          讓我們開始吧
  • 免費試用
  • 與我們聯絡
前往家用產品
與我們聯繫
技術支援
  • 企業支援入口
  • 教育訓練與認證
  • 聯絡支援人員
  • 尋找支援合作夥伴
參考資源
  • AI Security
  • 趨勢科技 vs. 競爭對手
  • 網路資安風險指標/評估
  • 「What Is?」
  • 威脅百科
  • 資安險
  • 名詞解釋
  • 年度預測
登入
  • Vision One
  • 技術支援
  • 合作夥伴入口網站
  • Cloud One
  • 產品啟動與管理
arrow_back
search
close
  • Threat Encyclopedia
  • Network Content Inspection Rules

Network Content Inspection Rules

    Confidence Level:  
    Low
    Medium
    High
    Default Rule:  
    Rule IDRule DescriptionConfidence LevelDDI Default RuleNetwork Content Inspection Pattern Release Date
    DDI RULE 5421 APT - BPFDOOR - UDP High
    2025/06/26DDI RULE 5421/vinfo/tw/threat-encyclopedia/network/ddi-rule-5421
    DDI RULE 5420 APT - BPFDOOR - TCP High
    2025/06/19DDI RULE 5420/vinfo/tw/threat-encyclopedia/network/ddi-rule-5420
    DDI RULE 5413 CVE-2025-46337 - ADODB SQL INJECTION - HTTP (Response) High
    2025/06/10DDI RULE 5413/vinfo/tw/threat-encyclopedia/network/ddi-rule-5413
    DDI RULE 5406 ECHARGE COMMAND INJECTION EXPLOIT - HTTP (Response) High
    2025/05/29DDI RULE 5406/vinfo/tw/threat-encyclopedia/network/ddi-rule-5406
    DDI RULE 5394 CVE-2024-57050 - TPLINK EXPLOIT - HTTP(Response) High
    2025/05/13DDI RULE 5394/vinfo/tw/threat-encyclopedia/network/ddi-rule-5394
    DDI RULE 5392 CVE-2024-23468 - SOLARWINDS PATH TRAVERSAL - TCP (Request) High
    2025/05/07DDI RULE 5392/vinfo/tw/threat-encyclopedia/network/ddi-rule-5392
    DDI RULE 5387 CVE-2023-44221 - SONICWALL EXPLOIT COMMAND INJECTION EXPLOIT - HTTP(RESPONSE) High
    2025/05/03DDI RULE 5387/vinfo/tw/threat-encyclopedia/network/ddi-rule-5387
    DDI RULE 5385 CVE-2021-47667 - ZENDTO RCE - HTTP (Request) High
    2025/04/30DDI RULE 5385/vinfo/tw/threat-encyclopedia/network/ddi-rule-5385
    DDI RULE 5382 CVE-2025-31324 - SAP NETWEAVER UPLOAD EXPLOIT REQUEST - HTTP(REQUEST) High
    2025/04/26DDI RULE 5382/vinfo/tw/threat-encyclopedia/network/ddi-rule-5382
    DDI RULE 5377 ROUTER CLEARTEXT PASSWORD DISCLOSURE EXPLOIT - HTTP (Request) High
    2025/04/22DDI RULE 5377/vinfo/tw/threat-encyclopedia/network/ddi-rule-5377
    DDI RULE 5375 CVE-2024-10188 - LITELLM DOS - HTTP (Request) High
    2025/04/16DDI RULE 5375/vinfo/tw/threat-encyclopedia/network/ddi-rule-5375
    DDI RULE 5369 IVANTI TRAVERSAL EXPLOIT - HTTP(Response) High
    2025/04/15DDI RULE 5369/vinfo/tw/threat-encyclopedia/network/ddi-rule-5369
    DDI RULE 5363 CVE-2024-50330 - IVANTI SQL INJECTION - HTTP (Response) High
    2025/04/02DDI RULE 5363/vinfo/tw/threat-encyclopedia/network/ddi-rule-5363
    DDI RULE 5359 CVE-2018-8639 - Win32k Privilege Escalation Exploit - HTTP (Response) High
    2025/03/26DDI RULE 5359/vinfo/tw/threat-encyclopedia/network/ddi-rule-5359
    DDI RULE 5353 CVE-2024-45195 - APACHE OFBIZ RCE EXPLOIT - HTTP(Request) High
    2025/03/17DDI RULE 5353/vinfo/tw/threat-encyclopedia/network/ddi-rule-5353
    DDI RULE 5349 SVCCTL Start Service - SMB2 (Request) High
    2025/03/13DDI RULE 5349/vinfo/tw/threat-encyclopedia/network/ddi-rule-5349
    DDI RULE 5340 LBLINK COMMAND INJECTION EXPLOIT - HTTP (Request) High
    2025/03/05DDI RULE 5340/vinfo/tw/threat-encyclopedia/network/ddi-rule-5340
    DDI RULE 5323 CVE-2024-49112 - INTEGER OVERFLOW EXPLOIT - LDAP (Response) High
    2025/02/20DDI RULE 5323/vinfo/tw/threat-encyclopedia/network/ddi-rule-5323
    DDI RULE 5305 CVE-2024-42327 - Zabbix SQL Injection - HTTP (Response) High
    2025/02/18DDI RULE 5305/vinfo/tw/threat-encyclopedia/network/ddi-rule-5305
    DDI RULE 5318 CVE-2025-0282 - IVANTI RCE EXPLOIT - HTTP(Request) High
    2025/02/17DDI RULE 5318/vinfo/tw/threat-encyclopedia/network/ddi-rule-5318
    DDI RULE 5320 CVE-2025-0107 - Palo Alto Networks Expedition Insecure Deserialization Exploit - HTTP (Response) High
    2025/02/17DDI RULE 5320/vinfo/tw/threat-encyclopedia/network/ddi-rule-5320
    DDI RULE 5316 CVE-2024-37404 - IVANTI RCE EXPLOIT - HTTP (Response) High
    2025/02/12DDI RULE 5316/vinfo/tw/threat-encyclopedia/network/ddi-rule-5316
    DDI RULE 5314 ADCS Suspicious use of Certificate - Kerberos (Request) High
    2025/02/11DDI RULE 5314/vinfo/tw/threat-encyclopedia/network/ddi-rule-5314
    DDI RULE 5310 CVE-2024-52047 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (Request) High
    2025/02/06DDI RULE 5310/vinfo/tw/threat-encyclopedia/network/ddi-rule-5310
    DDI RULE 5312 CVE-2024-40711 - Veeam Backup & Replication Remote Command Execution Exploit - HTTP (Response) High
    2025/02/06DDI RULE 5312/vinfo/tw/threat-encyclopedia/network/ddi-rule-5312
    DDI RULE 5303 CVE-2024-51378 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5303/vinfo/tw/threat-encyclopedia/network/ddi-rule-5303
    DDI RULE 5311 CVE-2022-22947 - SPRINGCLOUD RCE EXPLOIT - HTTP (Request) High
    2025/02/05DDI RULE 5311/vinfo/tw/threat-encyclopedia/network/ddi-rule-5311
    DDI RULE 5292 CVE-2024-47575 - FORTIMANAGER RCE EXPLOIT - HTTP (Response) High
    2025/02/04DDI RULE 5292/vinfo/tw/threat-encyclopedia/network/ddi-rule-5292
    DDI RULE 5304 CVE-2024-12828 - WEBMIN RCE EXPLOIT - HTTP (Response) High
    2025/01/30DDI RULE 5304/vinfo/tw/threat-encyclopedia/network/ddi-rule-5304
    DDI RULE 5306 CVE-2024-53691 - QNAP RCE - HTTP (Request) High
    2025/01/30DDI RULE 5306/vinfo/tw/threat-encyclopedia/network/ddi-rule-5306
    DDI RULE 5307 CVE-2024-50388 - QNAP BACKUP EXPLOIT - HTTP(Request) High
    2025/01/30DDI RULE 5307/vinfo/tw/threat-encyclopedia/network/ddi-rule-5307
    DDI RULE 5302 CVE-2024-8963 - IVANTI AUTH BYPASS EXPLOIT - HTTP (Response) High
    2025/01/24DDI RULE 5302/vinfo/tw/threat-encyclopedia/network/ddi-rule-5302
    DDI RULE 5300 CVE-2024-29847 - IVANTI RCE EXPLOIT - TCP (Request) High
    2025/01/22DDI RULE 5300/vinfo/tw/threat-encyclopedia/network/ddi-rule-5300
    DDI RULE 5301 CVE-2024-50603 - AVIATRIX COMMAND INJECTION - HTTP (Request) High
    2025/01/21DDI RULE 5301/vinfo/tw/threat-encyclopedia/network/ddi-rule-5301
    DDI RULE 5246 Entropy Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5246/vinfo/tw/threat-encyclopedia/network/ddi-rule-5246
    DDI RULE 5247 Base64 Encoded Cookie Sensor - HTTP (Request) Low
    2025/01/20DDI RULE 5247/vinfo/tw/threat-encyclopedia/network/ddi-rule-5247
    DDI RULE 5299 HTTP Websocket Connection to External Server (Request) Low
    2025/01/16DDI RULE 5299/vinfo/tw/threat-encyclopedia/network/ddi-rule-5299
    DDI RULE 1268 Reverse HTTPS Meterpreter detected - Variant 2 High
    2025/01/15DDI RULE 1268/vinfo/tw/threat-encyclopedia/network/ddi-rule-1268
    DDI RULE 5298 CVE-2024-5011 - WHATSUP GOLD EXPLOIT - HTTP (Request) High
    2025/01/15DDI RULE 5298/vinfo/tw/threat-encyclopedia/network/ddi-rule-5298
    DDI RULE 2744 OMRON FINS UDP Read Controller Attempt NSE - UDP (Request) Low
    2025/01/13DDI RULE 2744/vinfo/tw/threat-encyclopedia/network/ddi-rule-2744
    DDI RULE 5294 CVE-2024-38856 - OFBIZ AUTHBYPASS EXPLOIT - HTTP (Response) High
    2025/01/08DDI RULE 5294/vinfo/tw/threat-encyclopedia/network/ddi-rule-5294
    DDI RULE 5289 CVE-2024-49122 - MSMQ RCE EXPLOIT - TCP (Response) High
    2025/01/07DDI RULE 5289/vinfo/tw/threat-encyclopedia/network/ddi-rule-5289
    DDI RULE 5290 CVE-2024-9464 - PaloAlto Command Injection Exploit - HTTP (Request) High
    2025/01/06DDI RULE 5290/vinfo/tw/threat-encyclopedia/network/ddi-rule-5290
    DDI RULE 5297 CVE-2024-49113 - WINDOWS LDAP DOS EXPLOIT - CLDAP(RESPONSE) High
    2025/01/06DDI RULE 5297/vinfo/tw/threat-encyclopedia/network/ddi-rule-5297
    DDI RULE 5295 CVE-2024-50623 - CLEO DIRECTORY TRAVERSAL - HTTP (Request) High
    2025/01/02DDI RULE 5295/vinfo/tw/threat-encyclopedia/network/ddi-rule-5295
    DDI RULE 5288 CVE-2024-46938 - Sitecore Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5288/vinfo/tw/threat-encyclopedia/network/ddi-rule-5288
    DDI RULE 5291 CVE-2024-25153 - Fortra FileCatalyst Workflow Directory Traversal Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5291/vinfo/tw/threat-encyclopedia/network/ddi-rule-5291
    DDI RULE 5293 CVE-2024-11320 - Pandora Remote Command Execution Exploit - HTTP (Response) High
    2024/12/19DDI RULE 5293/vinfo/tw/threat-encyclopedia/network/ddi-rule-5293
    DDI RULE 4594 COBALTSTRIKE - HTTP(REQUEST) - Variant 3 High
    2024/12/11DDI RULE 4594/vinfo/tw/threat-encyclopedia/network/ddi-rule-4594
    DDI RULE 4861 COBEACON - DNS (Response) - Variant 3 High
    2024/12/11DDI RULE 4861/vinfo/tw/threat-encyclopedia/network/ddi-rule-4861
    DDI RULE 5253 CVE-2024-29830 - IVANTI SQL INJECTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5253/vinfo/tw/threat-encyclopedia/network/ddi-rule-5253
    DDI RULE 5281 AD File and Directory Discovery - SMB2 (Request) Medium
    2024/12/11DDI RULE 5281/vinfo/tw/threat-encyclopedia/network/ddi-rule-5281
    DDI RULE 5284 CVE-2024-34051 - DOLIBARR AC EXECUTION EXPLOIT - HTTP(REQUEST) High
    2024/12/11DDI RULE 5284/vinfo/tw/threat-encyclopedia/network/ddi-rule-5284
    DDI RULE 5287 Active Directory Certificate Services Template Discovery- LDAP (Request) High
    2024/12/11DDI RULE 5287/vinfo/tw/threat-encyclopedia/network/ddi-rule-5287
    DDI RULE 5283 CVE-2024-9264 - Grafana SQL Injection Exploit - HTTP (Response) High
    2024/12/10DDI RULE 5283/vinfo/tw/threat-encyclopedia/network/ddi-rule-5283
    DDI RULE 5286 Possible Discovery Using NETSHAREENUM API - SMB2 (Request) High
    2024/12/10DDI RULE 5286/vinfo/tw/threat-encyclopedia/network/ddi-rule-5286
    DDI RULE 4396 CVE-2020-1967 - Signature Algorithms Cert Denial of Service - HTTPS (Request) Medium
    2024/12/09DDI RULE 4396/vinfo/tw/threat-encyclopedia/network/ddi-rule-4396
    DDI RULE 5282 CVE-2024-43451 - WINDOWS NTLM RELAY EXPLOIT - HTTP (Response) High
    2024/12/09DDI RULE 5282/vinfo/tw/threat-encyclopedia/network/ddi-rule-5282
    DDI RULE 5285 CVE-2024-1884 - PAPERCUT SSRF EXPLOIT - HTTP(REQUEST) High
    2024/12/09DDI RULE 5285/vinfo/tw/threat-encyclopedia/network/ddi-rule-5285
    DDI RULE 5279 CVE-2024-47525 - LIBRENMS XSS EXPLOIT - HTTP(REQUEST) High
    2024/12/04DDI RULE 5279/vinfo/tw/threat-encyclopedia/network/ddi-rule-5279
    DDI RULE 5280 CVE-2024-42008 - Roundcube Information Disclosure Exploit - HTTP (Response) High
    2024/12/03DDI RULE 5280/vinfo/tw/threat-encyclopedia/network/ddi-rule-5280
    DDI RULE 5232 CVE-2024-45519 - ZIMBRA RCE EXPLOIT - SMTP (REQUEST) High
    2024/12/02DDI RULE 5232/vinfo/tw/threat-encyclopedia/network/ddi-rule-5232
    DDI RULE 5276 CVE-2024-5010 - WHATSUP GOLD EXPLOIT - HTTP(REQUEST) High
    2024/12/02DDI RULE 5276/vinfo/tw/threat-encyclopedia/network/ddi-rule-5276
    DDI RULE 5278 CVE-2024-0012 - PALO ALTO AUTH BYPASS - HTTP (Request) High
    2024/11/28DDI RULE 5278/vinfo/tw/threat-encyclopedia/network/ddi-rule-5278
    DDI RULE 5267 COVENANT Custom Profile - HTTP (Response) - Variant 2 High
    2024/11/27DDI RULE 5267/vinfo/tw/threat-encyclopedia/network/ddi-rule-5267
    DDI RULE 5274 Covenant Default Named Pipe - SMB2 (Request) High
    2024/11/26DDI RULE 5274/vinfo/tw/threat-encyclopedia/network/ddi-rule-5274
    DDI RULE 5269 SALITY C2 - TCP (REQUEST) High
    2024/11/21DDI RULE 5269/vinfo/tw/threat-encyclopedia/network/ddi-rule-5269
    DDI RULE 5271 CVE-2024-43572 - Microsoft Windows Management Console RCE Exploit - HTTP (Response) High
    2024/11/21DDI RULE 5271/vinfo/tw/threat-encyclopedia/network/ddi-rule-5271
    DDI RULE 5245 CVE-2024-6457 - WORDPRESS EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5245/vinfo/tw/threat-encyclopedia/network/ddi-rule-5245
    DDI RULE 5264 CVE-2024-51567 - CYBERPANEL RCE EXPLOIT - HTTP (Request) High
    2024/11/19DDI RULE 5264/vinfo/tw/threat-encyclopedia/network/ddi-rule-5264
    DDI RULE 5268 CVE-2024-7591 - Progress Kemp LoadMaster Command Injection Exploit - HTTP (Request) High
    2024/11/19DDI RULE 5268/vinfo/tw/threat-encyclopedia/network/ddi-rule-5268
    DDI RULE 5256 COVENANT Default - HTTP (Response) High
    2024/11/14DDI RULE 5256/vinfo/tw/threat-encyclopedia/network/ddi-rule-5256
    DDI RULE 5258 CVE-2024-9465 - PALOALTO EXPEDITION EXPLOIT - HTTP (Response) High
    2024/11/14DDI RULE 5258/vinfo/tw/threat-encyclopedia/network/ddi-rule-5258
    DDI RULE 5265 CVE-2024-40711 - VEEAM BACKUP RCE EXPLOIT - TCP (Request) High
    2024/11/14DDI RULE 5265/vinfo/tw/threat-encyclopedia/network/ddi-rule-5265
    DDI RULE 5263 CVE-2024-41874 - ADOBE COLDFUSION RCE EXPLOIT - HTTP (Response) High
    2024/11/13DDI RULE 5263/vinfo/tw/threat-encyclopedia/network/ddi-rule-5263
    DDI RULE 5262 CoreWarrior Exfiltration - HTTP (Request) High
    2024/11/12DDI RULE 5262/vinfo/tw/threat-encyclopedia/network/ddi-rule-5262
    DDI RULE 5259 FAKEWIN - HTTP (Request) High
    2024/11/11DDI RULE 5259/vinfo/tw/threat-encyclopedia/network/ddi-rule-5259
    DDI RULE 5260 RCSHELL BACKDOOR - HTTP (Request) High
    2024/11/11DDI RULE 5260/vinfo/tw/threat-encyclopedia/network/ddi-rule-5260
    DDI RULE 5261 HORUS PROTECTOR C2 - TCP (Response) High
    2024/11/11DDI RULE 5261/vinfo/tw/threat-encyclopedia/network/ddi-rule-5261
    DDI RULE 5257 CVE-2024-28988 - SOLARWINDS RCE EXPLOIT - HTTP (Response) High
    2024/11/07DDI RULE 5257/vinfo/tw/threat-encyclopedia/network/ddi-rule-5257
    DDI RULE 4219 GHOSTMINER - HTTP (Request) High
    2024/11/06DDI RULE 4219/vinfo/tw/threat-encyclopedia/network/ddi-rule-4219
    DDI RULE 4484 GOLDENSPY - HTTP (REQUEST) High
    2024/11/06DDI RULE 4484/vinfo/tw/threat-encyclopedia/network/ddi-rule-4484
    DDI RULE 4572 GLUPTEBA - HTTP (REQUEST) High
    2024/11/06DDI RULE 4572/vinfo/tw/threat-encyclopedia/network/ddi-rule-4572
    DDI RULE 5081 CVE-2024-36401 - GEOSERVER EXPLOIT - HTTP (REQUEST) High
    2024/11/06DDI RULE 5081/vinfo/tw/threat-encyclopedia/network/ddi-rule-5081
    DDI RULE 5139 PYC Download - HTTP (Response) Low
    2024/11/05DDI RULE 5139/vinfo/tw/threat-encyclopedia/network/ddi-rule-5139
    DDI RULE 5140 Python Download - HTTP (Response) Low
    2024/11/05DDI RULE 5140/vinfo/tw/threat-encyclopedia/network/ddi-rule-5140
    DDI RULE 1770 GHOLE - HTTP (Request) High
    2024/11/04DDI RULE 1770/vinfo/tw/threat-encyclopedia/network/ddi-rule-1770
    DDI RULE 5254 Possible Domain Controller List Discovery - DCERPC (Request) High
    2024/11/04DDI RULE 5254/vinfo/tw/threat-encyclopedia/network/ddi-rule-5254
    DDI RULE 5243 WebDAV Successful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5243/vinfo/tw/threat-encyclopedia/network/ddi-rule-5243
    DDI RULE 5244 WebDAV Unsuccessful File Download - HTTP (Response) High
    2024/10/29DDI RULE 5244/vinfo/tw/threat-encyclopedia/network/ddi-rule-5244
    DDI RULE 5249 KeyLogEXE Exfiltration - HTTP (Request) High
    2024/10/28DDI RULE 5249/vinfo/tw/threat-encyclopedia/network/ddi-rule-5249
    DDI RULE 5248 URIVAR EXFILTRATION - HTTP(REQUEST) Low
    2024/10/24DDI RULE 5248/vinfo/tw/threat-encyclopedia/network/ddi-rule-5248
    DDI RULE 5250 C2 SHELLCODE Transfer - HTTP (Response) Low
    2024/10/24DDI RULE 5250/vinfo/tw/threat-encyclopedia/network/ddi-rule-5250
    DDI RULE 5251 REMCOS DOWNLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5251/vinfo/tw/threat-encyclopedia/network/ddi-rule-5251
    DDI RULE 5252 CONOLEATHLOADER - HTTP (Request) High
    2024/10/24DDI RULE 5252/vinfo/tw/threat-encyclopedia/network/ddi-rule-5252
    DDI RULE 1886 Data Exfiltration - DNS (Response) Low
    2024/10/22DDI RULE 1886/vinfo/tw/threat-encyclopedia/network/ddi-rule-1886
    DDI RULE 5238 CVE-2024-32766 - PRIVWIZARD INJECTION EXPLOIT - HTTP (Request) High
    2024/10/22DDI RULE 5238/vinfo/tw/threat-encyclopedia/network/ddi-rule-5238
    DDI RULE 5240 CVE-2024-5932 - WordPress RCE Exploit - HTTP (Request) High
    2024/10/17DDI RULE 5240/vinfo/tw/threat-encyclopedia/network/ddi-rule-5240
    DDI RULE 5231 CVE-2024-32842 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/16DDI RULE 5231/vinfo/tw/threat-encyclopedia/network/ddi-rule-5231
    DDI RULE 5242 CVE-2024-5932 - GIVEWP RCE EXPLOIT - HTTP (Request) High
    2024/10/16DDI RULE 5242/vinfo/tw/threat-encyclopedia/network/ddi-rule-5242
    DDI RULE 5230 CVE-2024-32845 - Ivanti Endpoint Manager SQL Injection Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5230/vinfo/tw/threat-encyclopedia/network/ddi-rule-5230
    DDI RULE 5241 CVE-2024-37397 - Ivanti EPM Improper Restriction of XML External Entity Exploit - HTTP (Response) High
    2024/10/15DDI RULE 5241/vinfo/tw/threat-encyclopedia/network/ddi-rule-5241
    DDI RULE 5239 SYSTEMBC Shellcode Download - HTTP (Response) High
    2024/10/14DDI RULE 5239/vinfo/tw/threat-encyclopedia/network/ddi-rule-5239
    DDI RULE 5229 Advanced Port Scanner - HTTP (Request) High
    2024/10/10DDI RULE 5229/vinfo/tw/threat-encyclopedia/network/ddi-rule-5229
    DDI RULE 5233 CVE-2024-32846 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5233/vinfo/tw/threat-encyclopedia/network/ddi-rule-5233
    DDI RULE 5234 CVE-2024-32843 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5234/vinfo/tw/threat-encyclopedia/network/ddi-rule-5234
    DDI RULE 5235 CVE-2024-34779 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5235/vinfo/tw/threat-encyclopedia/network/ddi-rule-5235
    DDI RULE 5236 CVE-2024-34785 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/10/10DDI RULE 5236/vinfo/tw/threat-encyclopedia/network/ddi-rule-5236
    DDI RULE 5237 SYSTEMBC C2 - HTTP (Request) High
    2024/10/10DDI RULE 5237/vinfo/tw/threat-encyclopedia/network/ddi-rule-5237
    DDI RULE 5227 VALLEYRAT C2 - TCP (Response) High
    2024/10/09DDI RULE 5227/vinfo/tw/threat-encyclopedia/network/ddi-rule-5227
    DDI RULE 5228 Advanced IP Scanner - HTTP (Request) High
    2024/10/09DDI RULE 5228/vinfo/tw/threat-encyclopedia/network/ddi-rule-5228
    DDI RULE 5225 ONCESVC C2 - HTTP (Response) High
    2024/10/08DDI RULE 5225/vinfo/tw/threat-encyclopedia/network/ddi-rule-5225
    DDI RULE 5226 CVE-2024-6497 - SQUIRLLY EXPLOIT - HTTP (Request) High
    2024/10/08DDI RULE 5226/vinfo/tw/threat-encyclopedia/network/ddi-rule-5226
    DDI RULE 5221 CVE-2024-47177 - CUPS PRINTING RCE EXPLOIT - HTTP (REQUEST) High
    2024/10/03DDI RULE 5221/vinfo/tw/threat-encyclopedia/network/ddi-rule-5221
    DDI RULE 5223 LUMMAC - HTTP (Request) High
    2024/10/03DDI RULE 5223/vinfo/tw/threat-encyclopedia/network/ddi-rule-5223
    DDI RULE 5217 CVE-2024-8190 - Ivanti Cloud Service Appliance Authenticated Command Injection Exploit - HTTP (Response) High
    2024/10/02DDI RULE 5217/vinfo/tw/threat-encyclopedia/network/ddi-rule-5217
    DDI RULE 5222 CVE-2024-2876 - WORDPRESS SQL INJECTION EXPLOIT - HTTP (Request) High
    2024/10/02DDI RULE 5222/vinfo/tw/threat-encyclopedia/network/ddi-rule-5222
    DDI RULE 5218 CVE-2020-8599 - Trend Micro Apex One and OfficeScan Directory Traversal Exploit - HTTP (Request) High
    2024/10/01DDI RULE 5218/vinfo/tw/threat-encyclopedia/network/ddi-rule-5218
    DDI RULE 5219 CVE-2024-38077 - MS RDL RCE EXPLOIT - DCERPC (Request) High
    2024/10/01DDI RULE 5219/vinfo/tw/threat-encyclopedia/network/ddi-rule-5219
    DDI RULE 5220 CVE-2024-6670 - WhatsUp SQL Injection Exploit - HTTP (Response) High
    2024/10/01DDI RULE 5220/vinfo/tw/threat-encyclopedia/network/ddi-rule-5220
    DDI RULE 5216 Possible Generic Database Query - MySQL (Request) Medium
    2024/09/26DDI RULE 5216/vinfo/tw/threat-encyclopedia/network/ddi-rule-5216
    DDI RULE 5206 Remote Access Tool VNC - VNC (Response) High
    2024/09/23DDI RULE 5206/vinfo/tw/threat-encyclopedia/network/ddi-rule-5206
    DDI RULE 5207 Remote Access Tool RealVNC - VNC (Response) High
    2024/09/23DDI RULE 5207/vinfo/tw/threat-encyclopedia/network/ddi-rule-5207
    DDI RULE 5208 Remote Access Tool TightVNC - VNC (Response) High
    2024/09/23DDI RULE 5208/vinfo/tw/threat-encyclopedia/network/ddi-rule-5208
    DDI RULE 5209 Remote Access Tool UltraVNC - VNC (Response) High
    2024/09/23DDI RULE 5209/vinfo/tw/threat-encyclopedia/network/ddi-rule-5209
    DDI RULE 5214 CVE-2024-5505 - NETGEAR TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/09/17DDI RULE 5214/vinfo/tw/threat-encyclopedia/network/ddi-rule-5214
    DDI RULE 5215 CVE-2024-43461 - MSHTML SPOOFING EXPLOIT - HTTP (RESPONSE) High
    2024/09/17DDI RULE 5215/vinfo/tw/threat-encyclopedia/network/ddi-rule-5215
    DDI RULE 5082 CVE-2024-32113 - Apache OFBiz Directory Traversal Exploit - HTTP (Request) High
    2024/09/16DDI RULE 5082/vinfo/tw/threat-encyclopedia/network/ddi-rule-5082
    DDI RULE 5212 CVE-2023-51364 - QNAP RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/12DDI RULE 5212/vinfo/tw/threat-encyclopedia/network/ddi-rule-5212
    DDI RULE 5213 WebP Image Sensor - HTTP (Response) High
    2024/09/12DDI RULE 5213/vinfo/tw/threat-encyclopedia/network/ddi-rule-5213
    DDI RULE 5211 CVE-2023-38205 - Adobe ColdFusion Policy Bypass Exploit - HTTP (Request) High
    2024/09/11DDI RULE 5211/vinfo/tw/threat-encyclopedia/network/ddi-rule-5211
    DDI RULE 5210 Metasploit Web Delivery through PowerShell - HTTP (Response) Medium
    2024/09/10DDI RULE 5210/vinfo/tw/threat-encyclopedia/network/ddi-rule-5210
    DDI RULE 2793 APT - WINNTI - HTTP (Response) High
    2024/09/09DDI RULE 2793/vinfo/tw/threat-encyclopedia/network/ddi-rule-2793
    DDI RULE 5203 CVE-2024-5721 - LOGSIGN RCE EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5203/vinfo/tw/threat-encyclopedia/network/ddi-rule-5203
    DDI RULE 5204 CVE-2024-7928 - FASTADMIN TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/05DDI RULE 5204/vinfo/tw/threat-encyclopedia/network/ddi-rule-5204
    DDI RULE 5205 CVE-2024-29826 - IVANTI ENDPOINT RCE EXPLOIT - HTTP (REQUEST) High
    2024/09/05DDI RULE 5205/vinfo/tw/threat-encyclopedia/network/ddi-rule-5205
    DDI RULE 5097 CVE-2023-27532 - Veeam Backup and Replication Backup Service Authentication Bypass Exploit - TCP (Request) High
    2024/09/04DDI RULE 5097/vinfo/tw/threat-encyclopedia/network/ddi-rule-5097
    DDI RULE 5200 CVE-2024-38652 - IVANTI TRAVERSAL EXPLOIT - HTTP (RESPONSE) High
    2024/09/04DDI RULE 5200/vinfo/tw/threat-encyclopedia/network/ddi-rule-5200
    DDI RULE 5202 MAGICRAT EXFIL - HTTP(REQUEST) High
    2024/09/04DDI RULE 5202/vinfo/tw/threat-encyclopedia/network/ddi-rule-5202
    DDI RULE 4345 EMOTET - HTTP (Request) - Variant 7 High
    2024/09/03DDI RULE 4345/vinfo/tw/threat-encyclopedia/network/ddi-rule-4345
    DDI RULE 5098 JUPITERRAT - HTTP (REQUEST) High
    2024/08/29DDI RULE 5098/vinfo/tw/threat-encyclopedia/network/ddi-rule-5098
    DDI RULE 5099 FAKEBAT DOWNLOADER - HTTP(REQUEST) High
    2024/08/29DDI RULE 5099/vinfo/tw/threat-encyclopedia/network/ddi-rule-5099
    DDI RULE 5090 CVE-2021-26858 - Possible MS Exchange SSRF Exploit - HTTP (Response) Low
    2024/08/28DDI RULE 5090/vinfo/tw/threat-encyclopedia/network/ddi-rule-5090
    DDI RULE 5096 ZOMBIEDROP - HTTP (REQUEST) High
    2024/08/27DDI RULE 5096/vinfo/tw/threat-encyclopedia/network/ddi-rule-5096
    DDI RULE 5075 CVE-2024-49606 - TINYPROXY RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5075/vinfo/tw/threat-encyclopedia/network/ddi-rule-5075
    DDI RULE 5095 CVE-2024-4885 - WHATSUP GOLD TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/08/22DDI RULE 5095/vinfo/tw/threat-encyclopedia/network/ddi-rule-5095
    DDI RULE 5092 CVE-2024-7120 - RAISECOM COMMAND INJECTION EXPLOIT - HTTP (RESPONSE) High
    2024/08/20DDI RULE 5092/vinfo/tw/threat-encyclopedia/network/ddi-rule-5092
    DDI RULE 5093 Prometei C2 - HTTP (Request) High
    2024/08/20DDI RULE 5093/vinfo/tw/threat-encyclopedia/network/ddi-rule-5093
    DDI RULE 5094 Possible STEALBIT Exfiltration - HTTP (Request) Medium
    2024/08/20DDI RULE 5094/vinfo/tw/threat-encyclopedia/network/ddi-rule-5094
    DDI RULE 5091 RUTHENS ENCRYPTION - SMB2 (REQUEST) High
    2024/08/19DDI RULE 5091/vinfo/tw/threat-encyclopedia/network/ddi-rule-5091
    DDI RULE 5087 DAMEWARE RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/15DDI RULE 5087/vinfo/tw/threat-encyclopedia/network/ddi-rule-5087
    DDI RULE 5088 Possible Faker Generated Self-Signed Certificate - HTTPS Medium
    2024/08/14DDI RULE 5088/vinfo/tw/threat-encyclopedia/network/ddi-rule-5088
    DDI RULE 5089 COBEACON Default Named Pipe - SMB2 (Request) - Variant 2 Medium
    2024/08/14DDI RULE 5089/vinfo/tw/threat-encyclopedia/network/ddi-rule-5089
    DDI RULE 5085 CVE-2024-5008 - WHATSUP GOLD RCE EXPLOIT - HTTP (REQUEST) High
    2024/08/13DDI RULE 5085/vinfo/tw/threat-encyclopedia/network/ddi-rule-5085
    DDI RULE 5086 CVE-2019-0708 - Microsoft Windows Remote Desktop Services Remote Code Execution Exploit - TCP (Request) High
    2024/08/13DDI RULE 5086/vinfo/tw/threat-encyclopedia/network/ddi-rule-5086
    DDI RULE 5079 CVE-2023-42000 - Arcserve Unified Data Protection Path Traversal Exploit - HTTP (Request) High
    2024/08/12DDI RULE 5079/vinfo/tw/threat-encyclopedia/network/ddi-rule-5079
    DDI RULE 5084 CVE-2024-4883 - Progress WhatsUp Gold Traversal Exploit - TCP (Request) High
    2024/08/12DDI RULE 5084/vinfo/tw/threat-encyclopedia/network/ddi-rule-5084
    DDI RULE 5072 ADRECON QUERY - LDAP(Request) Low
    2024/08/09DDI RULE 5072/vinfo/tw/threat-encyclopedia/network/ddi-rule-5072
    DDI RULE 5083 CVE-2024-38856 - APACHE OFBIZ RCE EXPLOIT - HTTP (Request) High
    2024/08/09DDI RULE 5083/vinfo/tw/threat-encyclopedia/network/ddi-rule-5083
    DDI RULE 5077 CVE-2024-2863 - LG LED Directory Traversal Exploit - HTTP (Request) High
    2024/08/05DDI RULE 5077/vinfo/tw/threat-encyclopedia/network/ddi-rule-5077
    DDI RULE 5078 CVE-2024-36991 - Splunk Directory Traversal Exploit - HTTP (Response) High
    2024/08/05DDI RULE 5078/vinfo/tw/threat-encyclopedia/network/ddi-rule-5078
    DDI RULE 5074 CVE-2024-5015 - WHATSUP SSRF EXPLOIT - HTTP (REQUEST) High
    2024/08/01DDI RULE 5074/vinfo/tw/threat-encyclopedia/network/ddi-rule-5074
    DDI RULE 5076 CVE-2024-4879 - ServiceNow Template Injection Exploit - HTTP (Response) High
    2024/08/01DDI RULE 5076/vinfo/tw/threat-encyclopedia/network/ddi-rule-5076
    DDI RULE 4886 TRUEBOT - HTTP (REQUEST) - Variant 2 High
    2024/07/31DDI RULE 4886/vinfo/tw/threat-encyclopedia/network/ddi-rule-4886
    DDI RULE 5073 CVE-2024-38112 - MSHTML RCE EXPLOIT - SMB2 (REQUEST) High
    2024/07/31DDI RULE 5073/vinfo/tw/threat-encyclopedia/network/ddi-rule-5073
    DDI RULE 5063 CVE-2024-5806 - MOVEit Authentication Bypass Exploit - HTTP(Request) High
    2024/07/29DDI RULE 5063/vinfo/tw/threat-encyclopedia/network/ddi-rule-5063
    DDI RULE 5067 CVE-2024-4358 - TELERIK AUTHBYPASS EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5067/vinfo/tw/threat-encyclopedia/network/ddi-rule-5067
    DDI RULE 5068 CVE-2024-37389 - APACHE NIFI EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5068/vinfo/tw/threat-encyclopedia/network/ddi-rule-5068
    DDI RULE 5069 PHP DEV EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5069/vinfo/tw/threat-encyclopedia/network/ddi-rule-5069
    DDI RULE 5070 CVE-2024-27348 - APACHE HUGEGRAPH RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/25DDI RULE 5070/vinfo/tw/threat-encyclopedia/network/ddi-rule-5070
    DDI RULE 5071 RC4 Encryption in Pre-Authentication - Kerberos (Request) Medium
    2024/07/25DDI RULE 5071/vinfo/tw/threat-encyclopedia/network/ddi-rule-5071
    DDI RULE 5064 CVE-2024-38112 - MSHTML RCE EXPLOIT - HTTP (RESPONSE) High
    2024/07/24DDI RULE 5064/vinfo/tw/threat-encyclopedia/network/ddi-rule-5064
    DDI RULE 5065 CVE-2024-28995 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5065/vinfo/tw/threat-encyclopedia/network/ddi-rule-5065
    DDI RULE 5066 CVE-2024-4040 - CRUSHFTP RCE EXPLOIT - HTTP (REQUEST) High
    2024/07/24DDI RULE 5066/vinfo/tw/threat-encyclopedia/network/ddi-rule-5066
    DDI RULE 4682 MULTIPLE LATERAL MOVEMENT - SMB2(REQUEST) Low
    2024/07/23DDI RULE 4682/vinfo/tw/threat-encyclopedia/network/ddi-rule-4682
    DDI RULE 5052 CVE-2024-0769 - D-Link Directory Traversal Exploit - HTTP (Response) High
    2024/07/18DDI RULE 5052/vinfo/tw/threat-encyclopedia/network/ddi-rule-5052
    DDI RULE 5059 POSSIBLE KIMSUKY C2 - HTTP (Request) Medium
    2024/07/18DDI RULE 5059/vinfo/tw/threat-encyclopedia/network/ddi-rule-5059
    DDI RULE 5061 CVE-2024-21683 - Atlassian Confluence Server RCE Exploit - HTTP (Request) High
    2024/07/17DDI RULE 5061/vinfo/tw/threat-encyclopedia/network/ddi-rule-5061
    DDI RULE 5027 Telegram Bot API Sensor - HTTP (Response) Medium
    2024/07/16DDI RULE 5027/vinfo/tw/threat-encyclopedia/network/ddi-rule-5027
    DDI RULE 5057 PRIVATELOADER C2 - HTTP (Request) High
    2024/07/16DDI RULE 5057/vinfo/tw/threat-encyclopedia/network/ddi-rule-5057
    DDI RULE 5060 HNAP RCE EXPLOIT - HTTP (Request) High
    2024/07/16DDI RULE 5060/vinfo/tw/threat-encyclopedia/network/ddi-rule-5060
    DDI RULE 5062 CVE-2024-23692 - Rejetto HTTP File Server Command Injection Exploit - HTTP (Response) High
    2024/07/16DDI RULE 5062/vinfo/tw/threat-encyclopedia/network/ddi-rule-5062
    DDI RULE 5053 HTA File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5053/vinfo/tw/threat-encyclopedia/network/ddi-rule-5053
    DDI RULE 5054 HTA File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5054/vinfo/tw/threat-encyclopedia/network/ddi-rule-5054
    DDI RULE 5055 SH File Download Root Directory Sensor- HTTP(RESPONSE) High
    2024/07/15DDI RULE 5055/vinfo/tw/threat-encyclopedia/network/ddi-rule-5055
    DDI RULE 5056 SH File Download Sub Root Directory Sensor - HTTP(RESPONSE) Medium
    2024/07/15DDI RULE 5056/vinfo/tw/threat-encyclopedia/network/ddi-rule-5056
    DDI RULE 5058 KOI LOADER C2 - HTTP (Request) High
    2024/07/15DDI RULE 5058/vinfo/tw/threat-encyclopedia/network/ddi-rule-5058
    DDI RULE 5047 CVE-2021-20837 - Movable Type XMLRPC Command Injection Exploit - HTTP (Response) High
    2024/07/11DDI RULE 5047/vinfo/tw/threat-encyclopedia/network/ddi-rule-5047
    DDI RULE 5050 ISO File Download Sensor - HTTP (Response) Low
    2024/07/11DDI RULE 5050/vinfo/tw/threat-encyclopedia/network/ddi-rule-5050
    DDI RULE 5049 APT - DARKPINK Exfiltration - SMTP (Request) Medium
    2024/07/10DDI RULE 5049/vinfo/tw/threat-encyclopedia/network/ddi-rule-5049
    DDI RULE 5051 AMADEY C2 - HTTP (Request) High
    2024/07/09DDI RULE 5051/vinfo/tw/threat-encyclopedia/network/ddi-rule-5051
    DDI RULE 4449 Remote Service execution through SMB2 SVCCTL detected - Variant 3 High
    2024/07/05DDI RULE 4449/vinfo/tw/threat-encyclopedia/network/ddi-rule-4449
    DDI RULE 5048 METASPLOIT (Payload) - Reverse HTTP Encrypted - HTTP (Response) Medium
    2024/07/03DDI RULE 5048/vinfo/tw/threat-encyclopedia/network/ddi-rule-5048
    DDI RULE 5046 Exfiltration SSH Private Key - HTTP (Response) High
    2024/06/24DDI RULE 5046/vinfo/tw/threat-encyclopedia/network/ddi-rule-5046
    DDI RULE 5044 CVE-2024-24919 - Check Point Information Disclosure Exploit - HTTP (Response) High
    2024/06/19DDI RULE 5044/vinfo/tw/threat-encyclopedia/network/ddi-rule-5044
    DDI RULE 5045 CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution - HTTP (Request) High
    2024/06/19DDI RULE 5045/vinfo/tw/threat-encyclopedia/network/ddi-rule-5045
    DDI RULE 5033 METASPLOIT (Payload) - Reverse TCP Encrypted - TCP (Response) Medium
    2024/06/13DDI RULE 5033/vinfo/tw/threat-encyclopedia/network/ddi-rule-5033
    DDI RULE 5043 Gomir C2 - HTTP (Request) High
    2024/06/04DDI RULE 5043/vinfo/tw/threat-encyclopedia/network/ddi-rule-5043
    DDI RULE 5042 CVE-2024-4956 - Nexus Repository 3 Path Traversal Exploit - HTTP (Response) High
    2024/05/30DDI RULE 5042/vinfo/tw/threat-encyclopedia/network/ddi-rule-5042
    DDI RULE 5035 JSOUTPROX - HTTP (REQUEST) High
    2024/05/29DDI RULE 5035/vinfo/tw/threat-encyclopedia/network/ddi-rule-5035
    DDI RULE 5037 CVE-2024-3272 - D-LINK NAS devices Hardcoded Credential Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5037/vinfo/tw/threat-encyclopedia/network/ddi-rule-5037
    DDI RULE 5038 CVE-2024-3273 - D-LINK NAS devices Command Injection Exploit - HTTP (Request) High
    2024/05/29DDI RULE 5038/vinfo/tw/threat-encyclopedia/network/ddi-rule-5038
    DDI RULE 5039 SOAP API RCE - HTTP (Request) High
    2024/05/29DDI RULE 5039/vinfo/tw/threat-encyclopedia/network/ddi-rule-5039
    DDI RULE 5040 DLINK RCE - HTTP (Request) High
    2024/05/29DDI RULE 5040/vinfo/tw/threat-encyclopedia/network/ddi-rule-5040
    DDI RULE 5041 IDB EXFILTRATION - HTTP(REQUEST) High
    2024/05/29DDI RULE 5041/vinfo/tw/threat-encyclopedia/network/ddi-rule-5041
    DDI RULE 5031 CVE-2022-30333 - RARLab UnRAR Directory Traversal Exploit - HTTP (Response) High
    2024/05/27DDI RULE 5031/vinfo/tw/threat-encyclopedia/network/ddi-rule-5031
    DDI RULE 5034 TINYNUKE DOWNLOADER - HTTP (REQUEST) High
    2024/05/27DDI RULE 5034/vinfo/tw/threat-encyclopedia/network/ddi-rule-5034
    DDI RULE 5036 MELTED Hidden VNC - TCP (REQUEST) High
    2024/05/27DDI RULE 5036/vinfo/tw/threat-encyclopedia/network/ddi-rule-5036
    DDI RULE 5032 Copy BAT Files - SMB2 (Request) Low
    2024/05/21DDI RULE 5032/vinfo/tw/threat-encyclopedia/network/ddi-rule-5032
    DDI RULE 5030 MIMIC C2 - HTTP (Request) Medium
    2024/05/15DDI RULE 5030/vinfo/tw/threat-encyclopedia/network/ddi-rule-5030
    DDI RULE 4887 COBALTSTRIKE - HTTP (REQUEST) - Variant 4 High
    2024/05/09DDI RULE 4887/vinfo/tw/threat-encyclopedia/network/ddi-rule-4887
    DDI RULE 5028 EVILPROXY - HTTP (Response) High
    2024/05/07DDI RULE 5028/vinfo/tw/threat-encyclopedia/network/ddi-rule-5028
    DDI RULE 5024 CVE-2024-31138 - JetBrains TeamCity Cross-Site Scripting Exploit - HTTP (Request) High
    2024/05/06DDI RULE 5024/vinfo/tw/threat-encyclopedia/network/ddi-rule-5024
    DDI RULE 5025 CVE-2024-24401 - Nagios XI SQL Injection Exploit - HTTP (Response) High
    2024/05/06DDI RULE 5025/vinfo/tw/threat-encyclopedia/network/ddi-rule-5025
    DDI RULE 5026 POSSIBLE GOOTLOADER C2 - HTTP (Response) Medium
    2024/05/06DDI RULE 5026/vinfo/tw/threat-encyclopedia/network/ddi-rule-5026
    DDI RULE 5023 BATLOADER C2 - HTTP (Request) Medium
    2024/04/29DDI RULE 5023/vinfo/tw/threat-encyclopedia/network/ddi-rule-5023
    DDI RULE 5021 CVE-2023-48788 - FortiClientEMS SQL Injection Exploit - TCP (Request) High
    2024/04/18DDI RULE 5021/vinfo/tw/threat-encyclopedia/network/ddi-rule-5021
    DDI RULE 5022 CVE-2024-3400 - Palo Alto Command Injection Exploit - HTTP (Request) High
    2024/04/17DDI RULE 5022/vinfo/tw/threat-encyclopedia/network/ddi-rule-5022
    DDI RULE 5020 BUNNYLOADER - HTTP (REQUEST) High
    2024/04/15DDI RULE 5020/vinfo/tw/threat-encyclopedia/network/ddi-rule-5020
    DDI RULE 5017 CVE-2024-20767 - Cold Fusion Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5017/vinfo/tw/threat-encyclopedia/network/ddi-rule-5017
    DDI RULE 5018 CVE-2023-32315 - Ignite Realtime Openfire Directory Traversal Exploit - HTTP (Response) High
    2024/04/08DDI RULE 5018/vinfo/tw/threat-encyclopedia/network/ddi-rule-5018
    DDI RULE 5019 CVE-2023-42793 - Teamcity Server - HTTP(Response) High
    2024/04/08DDI RULE 5019/vinfo/tw/threat-encyclopedia/network/ddi-rule-5019
    DDI RULE 5016 Raccoon Stealer - HTTP (Request) High
    2024/04/02DDI RULE 5016/vinfo/tw/threat-encyclopedia/network/ddi-rule-5016
    DDI RULE 5015 COMEBACKER - HTTP (Request) High
    2024/04/01DDI RULE 5015/vinfo/tw/threat-encyclopedia/network/ddi-rule-5015
    DDI RULE 5014 APT - LOOKBACK - TCP (Request) High
    2024/03/25DDI RULE 5014/vinfo/tw/threat-encyclopedia/network/ddi-rule-5014
    DDI RULE 5013 Default GUID on External IP - SMB2 (Response) High
    2024/03/14DDI RULE 5013/vinfo/tw/threat-encyclopedia/network/ddi-rule-5013
    DDI RULE 5005 APT - LOOKBACK - TCP (Response) High
    2024/03/11DDI RULE 5005/vinfo/tw/threat-encyclopedia/network/ddi-rule-5005
    DDI RULE 5011 CVE-2024-27198 - JetBrains TeamCity Auth Bypass Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5011/vinfo/tw/threat-encyclopedia/network/ddi-rule-5011
    DDI RULE 5012 CVE-2024-27199 - JetBrains TeamCity Directory Traversal Exploit - HTTP (Response) High
    2024/03/11DDI RULE 5012/vinfo/tw/threat-encyclopedia/network/ddi-rule-5012
    DDI RULE 5010 NTLM Challenge from External IP Address - SMB2 (Response) Medium
    2024/03/07DDI RULE 5010/vinfo/tw/threat-encyclopedia/network/ddi-rule-5010
    DDI RULE 4923 Splashtop Business Access Remote Desktop RMM - DNS (Response) Low
    2024/03/05DDI RULE 4923/vinfo/tw/threat-encyclopedia/network/ddi-rule-4923
    DDI RULE 4999 CVE-2023-48365 - Qlik HTTP Smuggling - HTTP (Response) Medium
    2024/02/27DDI RULE 4999/vinfo/tw/threat-encyclopedia/network/ddi-rule-4999
    DDI RULE 5001 TeamViewer RMM - UDP (Request) Medium
    2024/02/26DDI RULE 5001/vinfo/tw/threat-encyclopedia/network/ddi-rule-5001
    DDI RULE 5002 TeamViewer RMM - DNS (Response) Medium
    2024/02/26DDI RULE 5002/vinfo/tw/threat-encyclopedia/network/ddi-rule-5002
    DDI RULE 5008 CVE-2023-41265 - QLIK Request Tunneling Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5008/vinfo/tw/threat-encyclopedia/network/ddi-rule-5008
    DDI RULE 5009 CVE-2023-41266 - QLIK Directory Traversal Exploit - HTTP (Request) High
    2024/02/26DDI RULE 5009/vinfo/tw/threat-encyclopedia/network/ddi-rule-5009
    DDI RULE 5006 CVE-2024-1708 - ConnectWise ScreenConnect Directory Traversal Exploit - HTTP (Request) High
    2024/02/23DDI RULE 5006/vinfo/tw/threat-encyclopedia/network/ddi-rule-5006
    DDI RULE 5007 CVE-2024-1709 - ConnectWise ScreenConnect Authentication Bypass Exploit - HTTP (Response) High
    2024/02/23DDI RULE 5007/vinfo/tw/threat-encyclopedia/network/ddi-rule-5007
    DDI RULE 5003 CVE-2024-22024 - Ivanti Connect Secure & Policy Secure Authentication Bypass Exploit - HTTP (Request) High
    2024/02/22DDI RULE 5003/vinfo/tw/threat-encyclopedia/network/ddi-rule-5003
    DDI RULE 5004 SuperOps RMM Sensor - DNS (Response) Low
    2024/02/22DDI RULE 5004/vinfo/tw/threat-encyclopedia/network/ddi-rule-5004
    DDI RULE 4996 CVE-2024-21893 - Ivanti Connect Secure & Policy Secure Gateways Server-Side Request Forgery Exploit - HTTP (Request) High
    2024/02/19DDI RULE 4996/vinfo/tw/threat-encyclopedia/network/ddi-rule-4996
    DDI RULE 4998 DARKME - TCP (Request) High
    2024/02/15DDI RULE 4998/vinfo/tw/threat-encyclopedia/network/ddi-rule-4998
    DDI RULE 5000 GhostLocker Exfiltration - HTTP (Request) High
    2024/02/15DDI RULE 5000/vinfo/tw/threat-encyclopedia/network/ddi-rule-5000
    DDI RULE 4995 CVE-2023-46805 - Ivanti Connect Secure & Policy Secure Gateways Authentication Bypass Exploit - HTTP (Response) High
    2024/02/12DDI RULE 4995/vinfo/tw/threat-encyclopedia/network/ddi-rule-4995
    DDI RULE 4997 CVE-2024-23897 - Jenkins Authentication Bypass Exploit - HTTP (Request) High
    2024/02/12DDI RULE 4997/vinfo/tw/threat-encyclopedia/network/ddi-rule-4997
    DDI RULE 4994 CVE-2024-0204 - Fortra GoAnywhere MFT AuthBypass Exploit - HTTP(Request) High
    2024/02/01DDI RULE 4994/vinfo/tw/threat-encyclopedia/network/ddi-rule-4994
    DDI RULE 4973 Possible Encryption Downgrade Attack - Kerberos (Response) Medium
    2024/01/31DDI RULE 4973/vinfo/tw/threat-encyclopedia/network/ddi-rule-4973
    DDI RULE 4992 CVE-2023-32252 - Linux Kernel ksmbd NULL Pointer Exploit - SMB2 (Request) High
    2024/01/31DDI RULE 4992/vinfo/tw/threat-encyclopedia/network/ddi-rule-4992
    DDI RULE 4986 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Response) Medium
    2024/01/29DDI RULE 4986/vinfo/tw/threat-encyclopedia/network/ddi-rule-4986
    DDI RULE 4991 PIKABOT EXFIL - HTTP (Request) High
    2024/01/29DDI RULE 4991/vinfo/tw/threat-encyclopedia/network/ddi-rule-4991
    DDI RULE 4993 MAGIC HOUND SOAP - HTTP(Request) High
    2024/01/29DDI RULE 4993/vinfo/tw/threat-encyclopedia/network/ddi-rule-4993
    DDI RULE 4974 HAVOC - HTTP (Request) High
    2024/01/25DDI RULE 4974/vinfo/tw/threat-encyclopedia/network/ddi-rule-4974
    DDI RULE 4990 CVE-2023-22527 - Atlassian OGNL Injection Exploit - HTTP (Request) High
    2024/01/25DDI RULE 4990/vinfo/tw/threat-encyclopedia/network/ddi-rule-4990
    DDI RULE 4987 TPRC - HTTP (Request) High
    2024/01/24DDI RULE 4987/vinfo/tw/threat-encyclopedia/network/ddi-rule-4987
    DDI RULE 4988 CVE-2023-46805 - Ivanti Connect Secure and Policy Secure Gateways Authentication Bypass Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4988/vinfo/tw/threat-encyclopedia/network/ddi-rule-4988
    DDI RULE 4989 CVE-2024-21887 - Ivanti Connect Secure and Policy Secure Gateways Command Injection Exploit - HTTP (Request) High
    2024/01/24DDI RULE 4989/vinfo/tw/threat-encyclopedia/network/ddi-rule-4989
    DDI RULE 4859 ZIP TLD MOVED - HTTP(RESPONSE) High
    2024/01/23DDI RULE 4859/vinfo/tw/threat-encyclopedia/network/ddi-rule-4859
    DDI RULE 4984 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP (REQUEST) - Variant 2 High
    2024/01/22DDI RULE 4984/vinfo/tw/threat-encyclopedia/network/ddi-rule-4984
    DDI RULE 4985 CVE-2023-46604 - Apache ActiveMQ RCE Exploit - TCP (Request) High
    2024/01/22DDI RULE 4985/vinfo/tw/threat-encyclopedia/network/ddi-rule-4985
    DDI RULE 4983 Micosoft Windows SmartScreen Exploit(ZDI-CAN-23100) - HTTP(Response) High
    2024/01/18DDI RULE 4983/vinfo/tw/threat-encyclopedia/network/ddi-rule-4983
    DDI RULE 4982 COPY FILES - SMB2(REQUEST) High
    2024/01/16DDI RULE 4982/vinfo/tw/threat-encyclopedia/network/ddi-rule-4982
    DDI RULE 4975 CVE-2023-51467- Apache OFBiz Pre-Auth RCE Exploit - HTTP (Response) High
    2024/01/11DDI RULE 4975/vinfo/tw/threat-encyclopedia/network/ddi-rule-4975
    DDI RULE 4976 SYSTEM INFORMATION DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4976/vinfo/tw/threat-encyclopedia/network/ddi-rule-4976
    DDI RULE 4977 TRUSTED DOMAIN DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4977/vinfo/tw/threat-encyclopedia/network/ddi-rule-4977
    DDI RULE 4978 PASSWORD POLICY DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4978/vinfo/tw/threat-encyclopedia/network/ddi-rule-4978
    DDI RULE 4979 PERMISSION GROUP DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4979/vinfo/tw/threat-encyclopedia/network/ddi-rule-4979
    DDI RULE 4980 SYSTEM OWNER DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4980/vinfo/tw/threat-encyclopedia/network/ddi-rule-4980
    DDI RULE 4981 ACCOUNT DISCOVERY - LDAP(REQUEST) Medium
    2024/01/11DDI RULE 4981/vinfo/tw/threat-encyclopedia/network/ddi-rule-4981
    DDI RULE 4972 PIKABOT DLL Dropper - HTTP (Request) Medium
    2024/01/10DDI RULE 4972/vinfo/tw/threat-encyclopedia/network/ddi-rule-4972
    DDI RULE 4968 Remcos - TCP Medium
    2024/01/03DDI RULE 4968/vinfo/tw/threat-encyclopedia/network/ddi-rule-4968
    DDI RULE 4969 Fonelab - Certificate - HTTPS Medium
    2024/01/03DDI RULE 4969/vinfo/tw/threat-encyclopedia/network/ddi-rule-4969
    DDI RULE 4970 CVE-2021-20016 - SonicWall SSLVPN SMA100 SQL Injection Exploit - HTTP (Request) High
    2024/01/03DDI RULE 4970/vinfo/tw/threat-encyclopedia/network/ddi-rule-4970
    DDI RULE 4971 APT CONN - UDP(REQUEST) High
    2024/01/02DDI RULE 4971/vinfo/tw/threat-encyclopedia/network/ddi-rule-4971
    DDI RULE 4928 CVE-2023-2914 - Rockwell Automation ThinManager ThinServer Type 13 Synchronization Integer Overflow Exploit - TCP (Request) High
    2023/12/21DDI RULE 4928/vinfo/tw/threat-encyclopedia/network/ddi-rule-4928
    DDI RULE 4967 CVE-2023-50164 - Apace Struts2 Path Traversal Exploit - HTTP (Request) High
    2023/12/19DDI RULE 4967/vinfo/tw/threat-encyclopedia/network/ddi-rule-4967
    DDI RULE 4965 LVRAN - HTTP (Request) High
    2023/12/18DDI RULE 4965/vinfo/tw/threat-encyclopedia/network/ddi-rule-4965
    DDI RULE 4966 BIGIP TMSH Path Exploit - HTTP (Response) Medium
    2023/12/14DDI RULE 4966/vinfo/tw/threat-encyclopedia/network/ddi-rule-4966
    DDI RULE 4949 CVE-2023-46747 - BIGIP Smug Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4949/vinfo/tw/threat-encyclopedia/network/ddi-rule-4949
    DDI RULE 4962 BRUTEFORCE - SMB(RESPONSE) High
    2023/12/12DDI RULE 4962/vinfo/tw/threat-encyclopedia/network/ddi-rule-4962
    DDI RULE 4964 CVE-2023-49070 - Apache OFBiz Pre-Auth RCE Exploit - HTTP (Request) High
    2023/12/12DDI RULE 4964/vinfo/tw/threat-encyclopedia/network/ddi-rule-4964
    DDI RULE 4963 CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP(REQUEST) High
    2023/12/11DDI RULE 4963/vinfo/tw/threat-encyclopedia/network/ddi-rule-4963
    DDI RULE 4958 POSSIBLE TUNNELING - DNS (Response) - Variant 2 Low
    2023/12/05DDI RULE 4958/vinfo/tw/threat-encyclopedia/network/ddi-rule-4958
    DDI RULE 4959 COBEACON C2 - HTTP(RESPONSE) Medium
    2023/12/05DDI RULE 4959/vinfo/tw/threat-encyclopedia/network/ddi-rule-4959
    DDI RULE 4961 TRAMPIKABOT - HTTP(REQUEST) High
    2023/12/05DDI RULE 4961/vinfo/tw/threat-encyclopedia/network/ddi-rule-4961
    DDI RULE 4930 RHYSIDA - SMB2 (Request) High
    2023/11/30DDI RULE 4930/vinfo/tw/threat-encyclopedia/network/ddi-rule-4930
    DDI RULE 4960 CVE-2023-46604 - Possible Apache ActiveMQ RCE Exploit - HTTP (Request) Medium
    2023/11/30DDI RULE 4960/vinfo/tw/threat-encyclopedia/network/ddi-rule-4960
    DDI RULE 4956 CVE-2023-47246 - SYSAID TRAVERSAL EXPLOIT - HTTP (Request) High
    2023/11/22DDI RULE 4956/vinfo/tw/threat-encyclopedia/network/ddi-rule-4956
    DDI RULE 4957 CVE-2023-4634 - Wordpress Plugin Media-Library-Assistant RCE Exploit - HTTP (Request) High
    2023/11/22DDI RULE 4957/vinfo/tw/threat-encyclopedia/network/ddi-rule-4957
    DDI RULE 4879 Possible CVE-2021-27876 - Veritas RCE Exploit - TCP (Response) Low
    2023/11/21DDI RULE 4879/vinfo/tw/threat-encyclopedia/network/ddi-rule-4879
    DDI RULE 4894 CVE-2023-28771 - Zyxel RCE Exploit - UDP (Request) High
    2023/11/21DDI RULE 4894/vinfo/tw/threat-encyclopedia/network/ddi-rule-4894
    DDI RULE 4952 APT CONN - TCP(REQUEST) High
    2023/11/20DDI RULE 4952/vinfo/tw/threat-encyclopedia/network/ddi-rule-4952
    DDI RULE 4954 CVE-2022-42475 - Fortinet FortiOS SSL-VPN Buffer Overflow Exploit - HTTP (Request) High
    2023/11/20DDI RULE 4954/vinfo/tw/threat-encyclopedia/network/ddi-rule-4954
    DDI RULE 4955 PIKABOT - Malicious Certificate - HTTPS High
    2023/11/20DDI RULE 4955/vinfo/tw/threat-encyclopedia/network/ddi-rule-4955
    DDI RULE 4935 ANOMALIES - HTTP(REQUEST) Medium
    2023/11/16DDI RULE 4935/vinfo/tw/threat-encyclopedia/network/ddi-rule-4935
    DDI RULE 4942 CVE-2023-4966 - NetScaler ADC and Gateway Buffer Overflow Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4942/vinfo/tw/threat-encyclopedia/network/ddi-rule-4942
    DDI RULE 4944 CVE-2023-28288 - MS Sharepoint Information Disclosure Exploit - HTTP(Request) High
    2023/11/16DDI RULE 4944/vinfo/tw/threat-encyclopedia/network/ddi-rule-4944
    DDI RULE 4947 GOOTLOADER XMLRPC - HTTP (Request) High
    2023/11/16DDI RULE 4947/vinfo/tw/threat-encyclopedia/network/ddi-rule-4947
    DDI RULE 4953 CVE-2023-20198 - Cisco IOS XE WebUI Authentication Bypass Exploit - HTTP (Request) High
    2023/11/16DDI RULE 4953/vinfo/tw/threat-encyclopedia/network/ddi-rule-4953
    DDI RULE 4913 CVE-2023-40044 - WS FTP RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4913/vinfo/tw/threat-encyclopedia/network/ddi-rule-4913
    DDI RULE 4936 CVE-2023-29516 - XWIKI RCE Exploit - HTTP (Request) High
    2023/11/14DDI RULE 4936/vinfo/tw/threat-encyclopedia/network/ddi-rule-4936

    免費試用我們的服務 30 天

    • 立即開始免費試用

    參考資源

    • 部落格
    • 新聞中心
    • 資安報告
    • 尋找合作夥伴

    技術支援

    • 企業支援入口
    • 與我們聯絡
    • 下載
    • 免費試用

    關於趨勢

    • 關於我們
    • 徵才
    • 營業據點
    • 展覽與研討會
    • Trust Center

    總部

    趨勢科技 - 台灣 (TW)

    106 台北市
    大安區 敦化南路二段
    198號8樓

    電話:+886-02-2378-9666

    選擇國家/地區

    close

    美洲 (The Americas)

    • 美國 (United States)
    • 巴西 (Brasil)
    • 加拿大 (Canada)
    • 墨西哥 (México)

    中東與非洲 (Middle East & Africa)

    • 南非
    • 中東與北非 (Middle East and North Africa)

    歐洲

    • 比利時 (België) (Belgium)
    • 捷克 (Česká Republika) (Czech Republic)
    • 丹麥 (Danmark)
    • 德國、奧地利、瑞士 (Deutschland, Österreich, Schweiz) (Germany, Austria, Switzerland)
    • 西班牙 (España) (Spain)
    • 法國 (France)
    • 愛爾蘭 (Ireland)
    • 義大利 (Italia) (Italy)
    • 荷蘭 (Nederland) (Netherlands)
    • 挪威 (Norge) (Norway)
    • 波蘭 (Polska) (Poland)
    • 芬蘭 (Suomi) (Finland)
    • 瑞典 (Sverige) (Sweden)
    • 土耳其 (Türkiye) (Turkey)
    • 英國 (United Kingdom)

    亞太地區 (Asia Pacific)

    • 澳洲 (Australia)
    • 中亞 (Центральная Азия) (Central Asia)
    • 香港 (English) (Hong Kong)
    • 香港 (中文) (Hong Kong)
    • 印度 (भारत गणराज्य) (India)
    • 印尼 (Indonesia)
    • 日本 (Japan)
    • 南韓 (대한민국) (South Korea)
    • 馬來西亞 (Malaysia)
    • 蒙古與喬治亞 (Монголия) (Mongolia) and (рузия) (Georgia)
    • 紐西蘭 (New Zealand)
    • 菲律賓 (Philippines)
    • 新加坡 (Singapore)
    • 台灣 (Taiwan)
    • ประเทศไทย (Thailand)
    • 越南 (Việt Nam) (Vietnam)

    隱私權 | 法律資訊 | 身心障礙輔助 | 網站地圖

    ©2024 年版權所有。趨勢科技股份有限公司保留所有權利。