#alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; classtype:attempted-admin; sid:2001055; rev:6; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2018-09-13 19:37:14 UTC
Added 2018-09-13 17:52:25 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; classtype:attempted-admin; sid:2001055; rev:6; metadata:created_at 2010_07_30, updated_at 2010_07_30;)
Added 2017-08-07 20:55:20 UTC
#alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; classtype:attempted-admin; sid:2001055; rev:6;)
Added 2017-05-11 17:17:07 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; classtype:attempted-admin; sid:2001055; rev:6;)
Added 2011-10-12 19:10:03 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; classtype: attempted-admin; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; sid:2001055; rev:6;)
Added 2011-09-15 14:46:29 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; classtype: attempted-admin; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; sid:2001055; rev:6;)
Added 2011-09-14 20:43:17 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; classtype: attempted-admin; reference:bugtraq,10224; reference:url,doc.emergingthreats.net/2001055; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/POLICY/POLICY_HP_Web_Jetadmin_Executefile_Access; sid:2001055; rev:6;)
Added 2011-02-04 17:21:19 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; reference:url,doc.emergingthreats.net/2001055; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/POLICY/POLICY_HP_Web_Jetadmin_Executefile_Access; sid:2001055; rev:6;)
Added 2010-06-28 22:46:59 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; reference:url,doc.emergingthreats.net/2001055; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/POLICY/POLICY_HP_Web_Jetadmin_Executefile_Access; sid:2001055; rev:6;)
Added 2010-06-28 22:46:59 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; reference:url,doc.emergingthreats.net/2001055; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/POLICY/POLICY_HP_Web_Jetadmin_Executefile_Access; sid: 2001055; rev:6;)
Added 2009-02-11 19:15:22 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; reference:url,doc.emergingthreats.net/2001055; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/POLICY/POLICY_HP_Web_Jetadmin_Executefile_Access; sid: 2001055; rev:6;)
Added 2009-02-11 19:15:22 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; sid: 2001055; rev:5;)
Added 2008-01-31 18:48:09 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg:"ET MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; sid: 2001055; rev:5;)
Added 2008-01-31 18:48:09 UTC
alert tcp $EXTERNAL_NET any -> $HOME_NET 8000 (msg: "BLEEDING-EDGE MISC HP Web
JetAdmin? ExecuteFile? admin access"; flow: to_server,established; content:"/plugins/framework/script/content.hts"; nocase; content:"ExecuteFile"; nocase; reference:bugtraq,10224; classtype: attempted-admin; sid: 2001055; rev:5; )