#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; classtype:web-application-attack; sid:2002381; rev:10; metadata:affected_product Web_Browsers, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, created_at 2010_07_30, deployment Perimeter, signature_severity Major, tag Web_Client_Attacks, updated_at 2016_07_01;)
Added 2020-08-05 19:01:39 UTC
#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; classtype:web-application-attack; sid:2002381; rev:10; metadata:affected_product Web_Browsers, affected_product Web_Browser_Plugins, attack_target Client_Endpoint, deployment Perimeter, tag Web_Client_Attacks, signature_severity Major, created_at 2010_07_30, updated_at 2016_07_01;)
Added 2017-08-07 20:55:55 UTC
#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; classtype:web-application-attack; sid:2002381; rev:10;)
Added 2011-10-12 19:11:32 UTC
#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; classtype:web-application-attack; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; sid:2002381; rev:10;)
Added 2011-09-14 21:37:55 UTC
#alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; classtype:web-application-attack; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Realplayer; sid:2002381; rev:10;)
Added 2011-02-04 17:21:48 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Realplayer; sid:2002381; rev:8;)
Added 2010-01-16 15:30:44 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_Realplayer; sid:2002381; rev:8;)
Added 2010-01-16 15:30:44 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; sid:2002381; rev:7;)
Added 2010-01-15 12:09:08 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET WEB_CLIENT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; sid:2002381; rev:7;)
Added 2010-01-15 12:09:08 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Realplayer; sid:2002381; rev:7;)
Added 2009-02-07 22:00:26 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; reference:url,doc.emergingthreats.net/bin/view/Main/2002381; reference:url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/EXPLOIT/EXPLOIT_Realplayer; sid:2002381; rev:7;)
Added 2009-02-07 22:00:26 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; sid:2002381; rev:6;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"ET EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; sid:2002381; rev:6;)
Added 2008-01-25 10:56:38 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; sid:2002381; rev:5;)
Added 2007-10-27 10:16:07 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BLEEDING-EDGE EXPLOIT
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; sid:2002381; rev:5;)
Added 2007-10-27 10:16:07 UTC
alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"BLEEDING-EDGE
RealPlayer?/Helix Player Format String Exploit"; flow:established,from_server; content:"
"; pcre:"/<[^>%]*%/R"; content:""; distance:0; reference:url,milw0rm.com/id.php?id=1232; reference:bugtraq,14945; reference:cve,2005-2710; classtype:web-application-attack; sid:2002381; rev:4;)