Skip to main content

Detection Capabilities

ASPM supports detecting the following vulnerability scanning behaviors and vulnerability exploitation behaviors:

No.Threat Detection RulesBusiness Security Detection Rules
1SQL InjectionAPI Unauthorized
2Command ExecutionAccount Credential Expired
3SSRFAccount Not Enabled
4XXEAccount Expired
5XSSAccount Locked
6File OperationsExecute System Commands
7Freemarker Template InjectionOutbound Requests
8Nashorn Expression InjectionDelete System Files
9JinJava Template InjectionModify System Files
10Rhino Template InjectionRead System Files
11Velocity Template InjectionRead System Files
12Java Native DeserializationPassword Reset
13Flex DeserializationMalicious Registration
14Castor DeserializationBrute Force
15Fastjson DeserializationCredential Stuffing
16Hessian DeserializationInterface Abuse
17Jackson DeserializationTicket Scalping
18JSON-IO DeserializationAbnormal High-Frequency API Access
19Jyaml DeserializationWeb Scraping
20Kryo DeserializationSMS Bombing
21Log4j DeserializationCredit Card Credential Stuffing
22Red5 Deserialization.........
23Snakeyaml Deserialization
24BeansXml Deserialization
25Xmldecode Deserialization
26Xstream Deserialization
27YamlBeans Deserialization
28Fastjson Baseline Check
29Tomcat Directory Traversal Baseline Check
30EL Expression Injection
31Freemarker Injection
32Jexl Expression Injection
33Jxpath Expression Injection
34Mvel Expression Injection
35OGNL Expression Injection
36QLExpression Injection
37ScriptEngine Expression Injection
38SPEL Expression Injection
39Nexus CVE2024-4956 Arbitrary File Read
40GlassFish Memory Shell
41Jetty Memory Shell
42Resin Memory Shell
43Spring MVC Interceptor Memory Shell
44Spring MVC Controller Memory Shell
45Tomcat Memory Shell
46Weblogic Memory Shell
47WebSocket Memory Shell
48WebSphere Memory Shell
49Dubbo Memory Shell
50WildFly Memory Shell
51Groovy Command Execution
52Godzilla Detection
53Behinder Detection
54Sensitive Information Detection
55Business Risk Identification
56SQL Weak Password Baseline Check
57Proactive Memory Shell Monitoring
58Shiro User Identity Collection
59Spring Security User Identity Collection
60Spring Security Unauthorized Detection
61Spring Actuator Unauthorized