




Attack Classification | Attack Description |
XSS Attack | Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. An attacker can use XSS to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. |
XSS Attack (Extended) | |
SQL Injection Attack | A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to affect the execution of predefined SQL commands. |
SQL Injection Attack (Extended) | |
Known Exploits | Known Exploits are mainly used to detect remote arbitrary code execution vulnerabilities, remote arbitrary command execution vulnerabilities, path traversal vulnerabilities, open redirect vulnerabilities, unauthorized access vulnerabilities, etc. in various applications, web servers, middleware, etc |
Known Exploits (Extended) | |
File Upload Attack | The file upload attack exploits vulnerabilities in an application's inadequate validation of uploaded file types, content, or paths to upload malicious files (such as WebShells, trojans, etc.), thereby gaining control over the server. |
File Upload Attack (Extended) | |
Server-Side template injection vulnerability | Prevents attackers from exploiting vulnerabilities in server access request APIs to initiate malicious requests. |
Server-Side template injection vulnerability (Extended) | |
Unauthorized access vulnerability | Some management backends and debugging pages don't verify the permissions of users sending requests. Therefore, attackers can use some system features to get sensitive information and execute code. |
Unauthorized access vulnerability (Extended) | |
Trojan Horse Attack | A WebShell is a malicious script implanted on a web server to enable remote control by attackers. Attackers upload WebShell scripts (e.g., PHP, ASP files) via file upload vulnerabilities or other exploits, allowing them to execute commands, steal data, or establish persistence for further attacks. |
Trojan Horse Attack (Extended) | |
XML Injection Attack | XXE (XML External Entity) attacks exploit vulnerabilities in XML parsers by crafting malicious XML documents to read local files, initiate remote requests, or cause denial of service. Attackers inject external entity definitions to access restricted resources or probe internal network information. |
XML Injection Attack (Extended) | |
Non-Compliant protocol | Attackers launch attacks by crafting malformed HTTP request packets. |
Non-Compliant protocol (Extended) | |
Invalid access to core files | Arbitrary file read/download vulnerabilities allow attackers to bypass application restrictions by crafting specific paths or parameters to read or download arbitrary files (e.g., configuration files, database credentials). This is typically caused by insufficient validation of user-supplied file paths. |
Invalid access to core files (Extended) | |
Command Injection Attack | The attacker crafts malicious inputs (such as system commands or code) to exploit vulnerabilities in how the target program processes user inputs. This causes the system to improperly execute the injected code or commands. Such attacks may result in data breaches, service disruptions, or even complete compromise of system control. |
Command Injection Attack (Extended) | |
Server-Side request forgery | Prevents attackers from exploiting vulnerabilities in server access request APIs to initiate malicious requests. |
Bad Robot | Bad Robot detection is mainly used to detect malicious tools such as web scanners and script batch acquisition tools. |
LDAP Injection Attack | LDAP Injection attacks involve inserting malicious LDAP query statements into input data from the client to manipulate predefined LDAP query logic. Successful LDAP injection can lead to unauthorized access to sensitive information in directory services (e.g., user credentials, permissions) or even modification/deletion of directory data. |
Feedback