Catch me if you can: detection of Injection exploitation by validating query and API Integrity
Common Information
Type | Value |
---|---|
UUID | 73ed16cc-1d4b-4327-983d-2138f2d86bcf |
Fingerprint | 2d5e9e8a6bf4670ca5236329a4c0ed3da49bfcb57d19c7e6da5c4f1e6c51543c |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | None |
Added to db | April 16, 2024, 9:39 p.m. |
Last updated | Aug. 31, 2024, 12:18 a.m. |
Headline | Catch me if you can: detection of Injection exploitation by validating query and API Integrity |
Title | Catch me if you can: detection of Injection exploitation by validating query and API Integrity |
Detected Hints/Tags/Attributes | 34/1/10 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 2 | cve-2019-5678 |
|
Details | CVE | 1 | cve-2019-12516 |
|
Details | Domain | 1 | www.prismosystems.com |
|
Details | Domain | 2 | prismosystems.com |
|
Details | 2 | rmani}@prismosystems.com |
||
Details | File | 1 | pplication_injection.pdf |
|
Details | File | 2 | agent.jar |
|
Details | File | 1 | helloworld.html |
|
Details | IPv4 | 619 | 0.0.0.0 |
|
Details | Url | 1 | https://www.prismosystems.com/wp-content/uploads/2019/06/prismo_web_a |