Skip to content

Latest commit

 

History

History
64 lines (39 loc) · 2.97 KB

references_j.md

File metadata and controls

64 lines (39 loc) · 2.97 KB

Sigma rule references as PDF

java_jndi_injection_exploitation_attempt

Title : Potential JNDI Injection Exploitation In JVM Based Application

Rule id : bb0e9cec-d4da-46f5-997f-22efc59f3dca

Url Pdf
https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs pdf/808d75891fee4d12a3b71d60f602f18c167d9a65052e162a72ada9446decc1f6.pdf
https://secariolabs.com/research/analysing-and-reproducing-poc-for-log4j-2-15-0 pdf/aad9174406ec0a4149e2f23844ad0431596df16465c32b7b36481847e286b867.pdf

java_local_file_read

Title : Potential Local File Read Vulnerability In JVM Based Application

Rule id : e032f5bc-4563-4096-ae3b-064bab588685

Url Pdf
https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs pdf/808d75891fee4d12a3b71d60f602f18c167d9a65052e162a72ada9446decc1f6.pdf

java_ognl_injection_exploitation_attempt

Title : Potential OGNL Injection Exploitation In JVM Based Application

Rule id : 4d0af518-828e-4a04-a751-a7d03f3046ad

Url Pdf
https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs pdf/808d75891fee4d12a3b71d60f602f18c167d9a65052e162a72ada9446decc1f6.pdf

java_rce_exploitation_attempt

Title : Process Execution Error In JVM Based Application

Rule id : d65f37da-a26a-48f8-8159-3dde96680ad2

Url Pdf
https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs pdf/808d75891fee4d12a3b71d60f602f18c167d9a65052e162a72ada9446decc1f6.pdf

java_xxe_exploitation_attempt

Title : Potential XXE Exploitation Attempt In JVM Based Application

Rule id : c4e06896-e27c-4583-95ac-91ce2279345d

Url Pdf
https://rules.sonarsource.com/java/RSPEC-2755 pdf/39834e1fa39a8d53709c91b6370fa9a1d6a98e30cf6d9ce3b92f480f2cb14334.pdf
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing pdf/5399190e6e4613de777edbbf2f2deb2b869ebdd1109c73ccf6c30ef273ed64c0.pdf
https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs pdf/808d75891fee4d12a3b71d60f602f18c167d9a65052e162a72ada9446decc1f6.pdf

juniper_bgp_missing_md5

Title : Juniper BGP Missing MD5

Rule id : a7c0ae48-8df8-42bf-91bd-2ea57e2f9d43

Url Pdf