代码搜索:Command

找到约 10,000 项符合「Command」的源代码

代码结果 10,000
www.eeworm.com/read/473927/6822621

txt 2106.txt

Rule: -- Sid: 2106 -- Summary: This event is generated when a remote user sends an IMAP LSUB command with invalid data to port 143 on an internal server. This may indicate an attempt to exploit a bu
www.eeworm.com/read/473927/6822654

txt 496.txt

Rule: -- Sid: 496 -- Summary: This event is generated by the successful completion of a directory listing operation. This may be indicative of post-compromise behavior indicating the use of a Windo
www.eeworm.com/read/473927/6822664

txt 663.txt

Rule: -- Sid: 663 -- Summary: This event is generated when the string "|sed -e '1,/^$/'" is found in the payload of a packet sent to a Sendmail server. This may be an attempt to exploit a problem i
www.eeworm.com/read/473927/6822721

txt 3058.txt

Rule: -- Sid: 3058 -- Summary: This event is generated when a remote user sends an overly long string to an IMAP server via the command COPY. This may indicate an attempt to exploit a buffer overf
www.eeworm.com/read/473927/6822828

txt 1348.txt

Rule: -- Sid: 1341 -- Summary: Attempted g++ command access via web -- Impact: Attempt to compile a binary on a host. -- Detailed Information: This is an attempt to compiile a C or C++ source on a
www.eeworm.com/read/473927/6822871

txt 1347.txt

Rule: -- Sid: 1341 -- Summary: Attempted g++ command access via web -- Impact: Attempt to compile a binary on a host. -- Detailed Information: This is an attempt to compiile a C or C++ source on a
www.eeworm.com/read/473927/6823002

txt 2330.txt

Rule: -- Sid: 2330 -- Summary: This event is generated when a remote user sends an overly long string to an IMAP server via the command AUTH. This may indicate an attempt to exploit a buffer overf
www.eeworm.com/read/473927/6823156

txt 1777.txt

Rule: -- Sid: 1777 -- Summary: This rule detects an attacker executing the STAT command along with file globbing character '*'. This affects Cisco equipment and Microsoft's IIS 4.0, 5.0, and 5.1.
www.eeworm.com/read/473927/6823173

txt 2391.txt

Rule: -- Sid: 2391 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow vulnerability associated with WuFtpd APPE command. -- Impact: Remote access. A successf
www.eeworm.com/read/473927/6823364

txt 1882.txt

Rule: -- Sid: 1882 -- Summary: This event is generated by the use of a UNIX "id" command. This may be indicative of post-compromise behavior where the attacker is checking for super user priv