Bharat Jogi December 10, 2021February 17, 2022 - 27 min read CVE-2021-44228: Apache Log4j2 Zero-Day Exploited in the Wild (Log4Shell)
Mayank Deshmukh October 27, 2021February 17, 2022 - 8 min read Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013)
Jyoti Raval October 27, 2021October 27, 2021 - 2 min read Apache Tomcat HTTP Request Smuggling Vulnerability (CVE-2021-33037)
Mayank Deshmukh September 21, 2021September 20, 2021 - 6 min read Apache Struts 2 Double OGNL Evaluation Vulnerability (CVE-2020-17530)
Srinivas Dambal March 10, 2020September 7, 2020 - 4 min read Detect Apache Tomcat AJP File Inclusion Vulnerability (CVE-2020-1938) using Qualys WAS
Asif Karel March 6, 2020September 6, 2020 - 3 min read Identifying Let’s Encrypt Revoked Certificates
Jimmy Graham August 23, 2018September 7, 2020 - 4 min read Detecting Apache Struts 2 Namespace RCE: CVE-2018-11776
Frank Catucci March 14, 2017September 7, 2020 - 6 min read A Comprehensive Approach to Detect and Block the Struts Critical Vulnerability CVE-2017-5638
Vikas Phonsa March 9, 2017September 6, 2020 - 2 min read Qualys WAF 2.0 Protects Against Critical Apache Struts Jakarta Vulnerability ( CVE-2017-5638 )
Xiaoran Dong August 29, 2016September 6, 2020 - 4 min read How Policy Compliance Plays a Mitigation Role to Protect Your System