{ "_meta": { "version": "1.2.0", "updated": "2026-02-24", "sources": ["OWASP Top 10", "CERT advisories", "CVE database", "VoIP Security Research", "XMPP Standards Foundation", "CrowdSec Threat Intel"] }, "categories": { "sqli": { "name": "SQL Injection", "severity": "critical", "enabled": true, "owasp": "A03:2021", "patterns": [ {"id": "sqli-001", "pattern": "union\\s+(all\\s+)?select", "desc": "UNION-based injection"}, {"id": "sqli-002", "pattern": "['\"]\\s*(or|and)\\s*['\"]?\\d", "desc": "Boolean-based injection"}, {"id": "sqli-003", "pattern": "(sleep|benchmark|waitfor|pg_sleep)\\s*\\(", "desc": "Time-based blind injection"}, {"id": "sqli-004", "pattern": "information_schema\\.", "desc": "Schema enumeration"}, {"id": "sqli-005", "pattern": "(load_file|into\\s+outfile|into\\s+dumpfile)", "desc": "File operations"}, {"id": "sqli-006", "pattern": "group\\s+by.+having", "desc": "HAVING clause injection"}, {"id": "sqli-007", "pattern": "order\\s+by\\s+\\d+(,\\d+)*--", "desc": "ORDER BY injection"} ] }, "xss": { "name": "Cross-Site Scripting", "severity": "high", "enabled": true, "owasp": "A03:2021", "patterns": [ {"id": "xss-001", "pattern": "]*>", "desc": "Script tag injection"}, {"id": "xss-002", "pattern": "javascript\\s*:", "desc": "JavaScript protocol"}, {"id": "xss-003", "pattern": "on(error|load|click|mouse|focus|blur)\\s*=", "desc": "Event handler injection"}, {"id": "xss-004", "pattern": "]*>", "desc": "Iframe injection"}, {"id": "xss-005", "pattern": "]*onload", "desc": "SVG-based XSS"}, {"id": "xss-006", "pattern": "expression\\s*\\(", "desc": "CSS expression injection"} ] }, "lfi": { "name": "Local File Inclusion", "severity": "critical", "enabled": true, "owasp": "A01:2021", "patterns": [ {"id": "lfi-001", "pattern": "\\.\\./", "desc": "Directory traversal"}, {"id": "lfi-002", "pattern": "/etc/(passwd|shadow|hosts)", "desc": "System file access"}, {"id": "lfi-003", "pattern": "/proc/(self|version|cmdline)", "desc": "Proc filesystem access"}, {"id": "lfi-004", "pattern": "php://filter", "desc": "PHP filter wrapper"}, {"id": "lfi-005", "pattern": "file://", "desc": "File protocol"}, {"id": "lfi-006", "pattern": "expect://", "desc": "Expect wrapper RCE"} ] }, "rce": { "name": "Remote Code Execution", "severity": "critical", "enabled": true, "owasp": "A03:2021", "patterns": [ {"id": "rce-001", "pattern": ";\\s*(cat|ls|id|whoami|uname|pwd)", "desc": "Command chaining"}, {"id": "rce-002", "pattern": "\\|\\s*(cat|ls|id|whoami|bash|sh)", "desc": "Pipe injection"}, {"id": "rce-003", "pattern": "\\$\\((cat|ls|id|whoami)", "desc": "Command substitution"}, {"id": "rce-004", "pattern": "`(cat|ls|id|whoami|curl|wget)`", "desc": "Backtick execution"}, {"id": "rce-005", "pattern": "(curl|wget)\\s+.+\\s*\\|\\s*(bash|sh)", "desc": "Remote script execution"}, {"id": "rce-006", "pattern": "\\{\\{.*\\}\\}", "desc": "Template injection (SSTI)"} ] }, "cve_2024": { "name": "CVE 2024-2025 Exploits", "severity": "critical", "enabled": true, "patterns": [ {"id": "cve-2024-3400", "pattern": "/api/v\\d/totp/user-backup", "desc": "PAN-OS GlobalProtect RCE", "cve": "CVE-2024-3400"}, {"id": "cve-2024-21887", "pattern": "/api/v1/totp/user-backup", "desc": "Ivanti Connect Secure", "cve": "CVE-2024-21887"}, {"id": "cve-2023-46747", "pattern": "/mgmt/tm/util/bash", "desc": "F5 BIG-IP RCE", "cve": "CVE-2023-46747"}, {"id": "cve-2023-22515", "pattern": "/setup/setupadministrator.action", "desc": "Confluence RCE", "cve": "CVE-2023-22515"}, {"id": "cve-2024-1709", "pattern": "/SetupWizard\\.aspx", "desc": "ConnectWise ScreenConnect", "cve": "CVE-2024-1709"}, {"id": "cve-2024-27198", "pattern": "/app/rest/users/id:\\d+/tokens", "desc": "TeamCity auth bypass", "cve": "CVE-2024-27198"} ] }, "scanners": { "name": "Vulnerability Scanners", "severity": "medium", "enabled": true, "patterns": [ {"id": "scan-001", "pattern": "(nikto|nmap|sqlmap|burp|zap|acunetix)", "desc": "Scanner user-agent", "check": "user-agent"}, {"id": "scan-002", "pattern": "/\\.git/config", "desc": "Git config probe"}, {"id": "scan-003", "pattern": "/\\.env", "desc": "Environment file probe"}, {"id": "scan-004", "pattern": "/(wp-login|xmlrpc)\\.php", "desc": "WordPress probe"}, {"id": "scan-005", "pattern": "/actuator/(health|info|env)", "desc": "Spring Boot actuator"}, {"id": "scan-006", "pattern": "/debug/pprof", "desc": "Go pprof debug"} ] }, "webmail": { "name": "Webmail Specific", "severity": "high", "enabled": true, "patterns": [ {"id": "mail-001", "pattern": "\\.\\./(config|db|data)", "desc": "Roundcube path traversal"}, {"id": "mail-002", "pattern": "_action=(upload|import).*\\.(php|phtml)", "desc": "Malicious upload"}, {"id": "mail-003", "pattern": "_uid=.*['\"><>]", "desc": "XSS in mail UID"}, {"id": "mail-004", "pattern": "installer/", "desc": "Installer access attempt"}, {"id": "mail-005", "pattern": "(temp|logs)/.*\\.(php|sh|pl)", "desc": "Script in temp/logs"} ] }, "api_abuse": { "name": "API Abuse", "severity": "medium", "enabled": true, "patterns": [ {"id": "api-001", "pattern": "/api/.*/admin", "desc": "Admin API access"}, {"id": "api-002", "pattern": "graphql.*(__schema|introspection)", "desc": "GraphQL introspection"}, {"id": "api-003", "pattern": "\\{.*\\$where.*\\}", "desc": "NoSQL injection"}, {"id": "api-004", "pattern": "jwt=.*\\.\\.\\.\\.", "desc": "JWT manipulation"} ] }, "voip": { "name": "VoIP/SIP Security", "severity": "high", "enabled": true, "patterns": [ {"id": "voip-001", "pattern": "SIP/2\\.0.*\\r\\n.*Via:.*\\r\\n.*]*;[^>]*exec", "desc": "SIP header injection", "check": "body"}, {"id": "voip-002", "pattern": "INVITE sip:.*\\$\\(|`|;", "desc": "SIP INVITE command injection"}, {"id": "voip-003", "pattern": "/ari/(channels|bridges|endpoints|recordings)/.*(\\||;|`|\\$\\()", "desc": "Asterisk ARI command injection"}, {"id": "voip-004", "pattern": "/admin/config\\.php.*(system|exec|passthru|shell_exec)", "desc": "FreePBX RCE attempt", "cve": "CVE-2019-19006"}, {"id": "voip-005", "pattern": "/recordings/misc/audio\\.php.*file=\\.\\./", "desc": "FreePBX path traversal", "cve": "CVE-2019-19006"}, {"id": "voip-006", "pattern": "Action:\\s*(originate|redirect).*Channel:.*Local/.*@", "desc": "AMI command injection via Channel"}, {"id": "voip-007", "pattern": "/cgi-bin/asterisk\\.cgi.*\\|", "desc": "Asterisk CGI injection"}, {"id": "voip-008", "pattern": "Content-Type:.*multipart.*boundary.*\\.\\./", "desc": "SIP multipart traversal"}, {"id": "voip-009", "pattern": "Digest.*uri=\".*\\.\\./", "desc": "SIP Digest auth traversal"}, {"id": "voip-010", "pattern": "SIP.*realm=\".*[<>'\"]", "desc": "SIP realm injection"}, {"id": "voip-011", "pattern": "/asterisk/rawman\\?action=", "desc": "Unauth AMI web access"}, {"id": "voip-012", "pattern": "Record-Route:.*]*\\$\\{", "desc": "SIP header expression injection"} ] }, "xmpp": { "name": "XMPP/Jabber Security", "severity": "high", "enabled": true, "patterns": [ {"id": "xmpp-001", "pattern": "'\"]", "desc": "BOSH session hijack"}, {"id": "xmpp-004", "pattern": "xmlns:xi=[\"']http://www.w3.org/2001/XInclude", "desc": "XXE via XInclude"}, {"id": "xmpp-005", "pattern": ".*.*file://", "desc": "OOB file access"}, {"id": "xmpp-010", "pattern": "to=[\"'][^\"']*(@|%)00", "desc": "Null byte in JID"} ] }, "cve_voip": { "name": "VoIP CVE Exploits", "severity": "critical", "enabled": true, "patterns": [ {"id": "cve-ast-2021-26906", "pattern": "/asterisk.*res_pjsip.*malformed.*sdp", "desc": "Asterisk PJSIP crash", "cve": "CVE-2021-26906"}, {"id": "cve-ast-2022-42705", "pattern": "Content-Length:\\s*-", "desc": "Asterisk negative CL DoS", "cve": "CVE-2022-42705"}, {"id": "cve-ast-2022-42706", "pattern": "Via:.*branch=z9hG4bK.*\\u0000", "desc": "Asterisk Via header overflow", "cve": "CVE-2022-42706"}, {"id": "cve-ast-2023-37457", "pattern": "Route:.*\\s*,\\s*.*\\u0000", "desc": "Asterisk Route header crash", "cve": "CVE-2023-37457"}, {"id": "cve-ast-2023-49294", "pattern": "INVITE.*m=audio.*a=rtpmap:\\d+.*\\s{1000,}", "desc": "Asterisk SDP buffer overflow", "cve": "CVE-2023-49294"}, {"id": "cve-ast-2024-35190", "pattern": "CSeq:.*[A-Z]{50,}", "desc": "Asterisk CSeq method overflow", "cve": "CVE-2024-35190"}, {"id": "cve-fpbx-2023-26566", "pattern": "/admin/ajax\\.php.*command=.*`", "desc": "FreePBX command injection", "cve": "CVE-2023-26566"}, {"id": "cve-kamailio-2020-27507", "pattern": "Via:.*received=.*\\[\\d{1000,}", "desc": "Kamailio overflow", "cve": "CVE-2020-27507"}, {"id": "cve-opensips-2023-49323", "pattern": "Contact:.*;\\+sip\\.instance=.*\\u0000", "desc": "OpenSIPS crash", "cve": "CVE-2023-49323"} ] }, "cve_xmpp": { "name": "XMPP CVE Exploits", "severity": "critical", "enabled": true, "patterns": [ {"id": "cve-prosody-2021-37601", "pattern": "xmlns=[\"'].*[\"']\\s*xmlns=[\"']", "desc": "Prosody namespace confusion", "cve": "CVE-2021-37601"}, {"id": "cve-prosody-2022-0217", "pattern": "