logo

Database

Security

Rules

Security Rules define automated logic and checks across code, cloud, applications, and binaries. They provide a structured approach to identifying vulnerabilities, strengthening secure development practices, and aligning with compliance and risk-management standards.

Total rules

15

Targets covered

1

Mapped standards

5

Technique DAST

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

2.1

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-297

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Jan 21, 2026

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-326

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-298

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-296

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.5

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: CERTIFICATE

CWE ID(s):

CWE-297

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025

0.6

Low

Target: SSL

Technology: PROTOCOL

CWE ID(s):

CWE-327

Last update time: Dec 1, 2025