We’ve been working behind the scenes to bring improvements to your vector detection process, with a focus on accuracy, reliability, and reducing noise.
Last month, we introduced a new Boolean-Based Blind SQL Injection detection method. However, after observing an increased rate of false positives, we’ve decided to revert to our previous, proven detection techniques for all SQL Injection variants. Accuracy remains our top priority.
JSON Web Tokens (JWTs) are widely used to carry identity and permission claims across modern applications. But when misconfigured or poorly protected, they open the door to serious risks.
Our new scanner detects weak or missing JWT protections, helping you identify:
Tokens with weak secrets that could allow attackers to forge valid tokens
Tag: Misconfiguration
NoSQL Injection vulnerabilities occur when special operators like $ne or $gt are injected into application inputs, manipulating database queries. This can lead to unauthorized access, data leakage, or bypassing authentication altogether.
Our latest scanner identifies these possible injection points, helping you catch them early and reduce risk.
Tag: NoSQL Injection