CCI-001310
Checks the validity of organization-defined information inputs to the system.
The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.
1 rule found Severity: Medium

Kona Site Defender must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The CA API Gateway must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The DataPower Gateway must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

DB2 must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

DB2 and associated applications must reserve the use of dynamic code execution for situations that require it.
1 rule found Severity: Medium

DB2 and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

SQL Server must check the validity of all data inputs except those specifically identified by the organization.
2 rules found Severity: Medium

The DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.
2 rules found Severity: Medium

The DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
2 rules found Severity: Medium

The Windows 2012 DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, to include IP ranges and IP versions.
1 rule found Severity: Medium

MongoDB must check the validity of all data inputs except those specifically identified by the organization.
3 rules found Severity: Medium

MongoDB and associated applications must reserve the use of dynamic code execution for situations that require it.
3 rules found Severity: Medium

PostgreSQL must check the validity of all data inputs except those specifically identified by the organization.
3 rules found Severity: Medium

PostgreSQL and associated applications must reserve the use of dynamic code execution for situations that require it.
3 rules found Severity: Medium

PostgreSQL and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
3 rules found Severity: Medium

The EDB Postgres Advanced Server must check the validity of all data inputs except those specifically identified by the organization.
2 rules found Severity: Medium

The EDB Postgres Advanced Server and associated applications must reserve the use of dynamic code execution for situations that require it.
2 rules found Severity: Medium

The EDB Postgres Advanced Server and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
2 rules found Severity: Medium

The BIG-IP ASM module must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The BIG-IP Core implementation must be configured to check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

1 rule found Severity: Medium

CA IDMS must permit the use of dynamic code execution only in circumstances determined by the organization and limit use of online and batch command facilities from which dynamic statements can be issued.
1 rule found Severity: Medium

CA IDMS must limit the use of dynamic statements in applications, procedures, and exits to circumstances determined by the organization.
1 rule found Severity: Medium

CA IDMS must limit use of IDMS server used in issuing dynamic statements from client applications circumstances determined by the organization.
1 rule found Severity: Medium

CA IDMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

The DNS server implementation must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The F5 BIG-IP appliance must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

Azure SQL Database must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The Azure SQL Database and associated applications must reserve the use of dynamic code execution for situations that require it.
1 rule found Severity: Medium

The Azure SQL Database and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

The Windows DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, including IP ranges and IP versions.
1 rule found Severity: Medium

The MySQL Database Server 8.0 must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The MySQL Database Server 8.0 and associated applications must reserve the use of dynamic code execution for situations that require it.
1 rule found Severity: Medium

The MySQL Database Server 8.0 and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

Redis Enterprise DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.
1 rule found Severity: Medium

Redis Enterprise DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

1 rule found Severity: Medium

The web server must interpret and normalize ambiguous HTTP requests or terminate the TCP connection.
1 rule found Severity: Medium

The web server must terminate the connection if server-level exceptions are triggered when handling requests to prevent HTTP request smuggling attacks.
1 rule found Severity: Medium

The application server must check the validity of all data inputs to the management interface, except those specifically identified by the organization.
1 rule found Severity: Medium

The ALG must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

1 rule found Severity: High

1 rule found Severity: Medium

1 rule found Severity: Medium

The DBMS must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

The IDPS must, for fragmented packets, either block the packets or properly reassemble the packets before inspecting and forwarding.
1 rule found Severity: Medium

The Mainframe Product must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

MariaDB must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

MariaDB and associated applications must reserve the use of dynamic code execution for situations that require it.
1 rule found Severity: Medium

MariaDB and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
1 rule found Severity: Medium

The VMM must check the validity of all data inputs except those specifically identified by the organization.
1 rule found Severity: Medium

VAMI must set the encoding for all text Multipurpose Internet Mail Extensions (MIME) types to UTF-8.
1 rule found Severity: Medium

2 rules found Severity: Medium

1 rule found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium

2 rules found Severity: Medium
