代码搜索:Command
找到约 10,000 项符合「Command」的源代码
代码结果 10,000
www.eeworm.com/read/473927/6822621
txt 2106.txt
Rule:
--
Sid:
2106
--
Summary:
This event is generated when a remote user sends an IMAP LSUB command
with invalid data to port 143 on an internal server. This may indicate
an attempt to exploit a bu
www.eeworm.com/read/473927/6822654
txt 496.txt
Rule:
--
Sid: 496
--
Summary:
This event is generated by the successful completion of a directory listing operation. This may be indicative of post-compromise behavior indicating the use of a Windo
www.eeworm.com/read/473927/6822664
txt 663.txt
Rule:
--
Sid:
663
--
Summary:
This event is generated when the string "|sed -e '1,/^$/'" is found in the payload of a packet sent to a Sendmail server. This may be an attempt to exploit a problem i
www.eeworm.com/read/473927/6822721
txt 3058.txt
Rule:
--
Sid:
3058
--
Summary:
This event is generated when a remote user sends an overly long string
to an IMAP server via the command COPY. This may indicate an attempt to
exploit a buffer overf
www.eeworm.com/read/473927/6822828
txt 1348.txt
Rule:
--
Sid:
1341
--
Summary:
Attempted g++ command access via web
--
Impact:
Attempt to compile a binary on a host.
--
Detailed Information:
This is an attempt to compiile a C or C++ source on a
www.eeworm.com/read/473927/6822871
txt 1347.txt
Rule:
--
Sid:
1341
--
Summary:
Attempted g++ command access via web
--
Impact:
Attempt to compile a binary on a host.
--
Detailed Information:
This is an attempt to compiile a C or C++ source on a
www.eeworm.com/read/473927/6823002
txt 2330.txt
Rule:
--
Sid:
2330
--
Summary:
This event is generated when a remote user sends an overly long string
to an IMAP server via the command AUTH. This may indicate an attempt to
exploit a buffer overf
www.eeworm.com/read/473927/6823156
txt 1777.txt
Rule:
--
Sid:
1777
--
Summary:
This rule detects an attacker executing the STAT command along with file globbing character '*'. This affects Cisco equipment and Microsoft's IIS 4.0, 5.0, and 5.1.
www.eeworm.com/read/473927/6823173
txt 2391.txt
Rule:
--
Sid:
2391
--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow vulnerability associated with WuFtpd APPE command.
--
Impact:
Remote access. A successf
www.eeworm.com/read/473927/6823364
txt 1882.txt
Rule:
--
Sid: 1882
--
Summary:
This event is generated by the use of a UNIX "id" command. This may be
indicative of post-compromise behavior where the attacker is checking
for super user priv