[Emerging-updates] Live Commit Output

emerging@emergingthreats.net emerging at emergingthreats.net
Mon Dec 28 13:44:07 EST 2009


[***] Results from Oinkmaster started Mon Dec 28 13:44:07 2009 [***]

[///]     Modified active rules:     [///]

 2010592 - ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .asp Filename Extension Parsing File Upload Security Bypass Attempt (asp) (emerging-web_server.rules)
 2010593 - ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .aspx Filename Extension Parsing File Upload Security Bypass Attempt (aspx) (emerging-web_server.rules)


[+++]      Added non-rule lines:     [+++]

     -> Added to emerging-sid-msg.map (2):
        2010592 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .asp Filename Extension Parsing File Upload Security Bypass Attempt (asp) || url,soroush.secproject.com/downloadable/iis-semicolon-report.pdf || url,www.securityfocus.com/bid/37460/info || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010592 || url,www.securityfocus.com/bid/37460/info
        2010593 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .aspx Filename Extension Parsing File Upload Security Bypass Attempt (aspx) || url,soroush.secproject.com/downloadable/iis-semicolon-report.pdf || url,www.securityfocus.com/bid/37460/info || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010593 || url,www.securityfocus.com/bid/37460/info

     -> Added to emerging-sid-msg.map.txt (2):
        2010592 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .asp Filename Extension Parsing File Upload Security Bypass Attempt (asp) || url,soroush.secproject.com/downloadable/iis-semicolon-report.pdf || url,www.securityfocus.com/bid/37460/info || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010592 || url,www.securityfocus.com/bid/37460/info
        2010593 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .aspx Filename Extension Parsing File Upload Security Bypass Attempt (aspx) || url,soroush.secproject.com/downloadable/iis-semicolon-report.pdf || url,www.securityfocus.com/bid/37460/info || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010593 || url,www.securityfocus.com/bid/37460/info

[---]     Removed non-rule lines:    [---]

     -> Removed from emerging-sid-msg.map (2):
        2010592 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .asp Filename Extension Parsing File Upload Security Bypass Attempt (asp) || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010592 || url,www.securityfocus.com/bid/37460/info
        2010593 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .aspx Filename Extension Parsing File Upload Security Bypass Attempt (aspx) || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010593 || url,www.securityfocus.com/bid/37460/info

     -> Removed from emerging-sid-msg.map.txt (2):
        2010592 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .asp Filename Extension Parsing File Upload Security Bypass Attempt (asp) || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010592 || url,www.securityfocus.com/bid/37460/info
        2010593 || ET WEB_SERVER Possible Microsoft Internet Information Services (IIS) .aspx Filename Extension Parsing File Upload Security Bypass Attempt (aspx) || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SERVER/WEB_IIS_Filename_Bypass || url,doc.emergingthreats.net/2010593 || url,www.securityfocus.com/bid/37460/info



More information about the Emerging-updates mailing list