Web Application Security
Name | Status | Update |
---|---|---|
Apache.Druid.JavaScriptDimFilter.Remote.Code.Execution |
Add
|
|
Apache.JSPWiki.AJAXPreview.jsp.Reflected.XSS |
Add
|
|
Apache.Tomcat.Form.Authentication.Example.XSS |
Add
|
|
vm2.Sandbox.CVE-2022-36067.Remote.Code.Execution |
Add
|
VM2 Sandbox Escape |
VMWare.Workspace.ONE.UEM.Console.SSRF |
Add
|
|
Zoho.ManagerEngine.Pro.Insecure.Java.Deserialization |
Add
|
|
A regular signature to prevent attackers from adding attack info through "NOT" SQL statement |
Mod
|
|
A regular signature to prevent attackers from extracting database version information using "@@version" |
Mod
|
|
A regular signature to prevent attackers from performing Command Injection attacks using "id" command |
Mod
|
|
A regular signature to prevent attackers from probing string type of fields using the "locate()" function |
Mod
|
|
An extended regular signature to prevent attackers from adding attack info through "NOT" SQL statement |
Mod
|
|
An extended regular signature to prevent attackers from extracting database version information using "@@version" |
Mod
|
|
An extended regular signature to prevent attackers from performing Command Injection attacks using "id" command |
Mod
|
|
An extended regular signature to prevent attackers from probing string type of fields using the "locate()" function |
Mod
|