Common Information
Type Value
Value
cve-2012-0507
Category
Type Cve
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2023-06-13 961 Known Exploited Vulnerabilities Catalog | CISA
Details Website 2023-03-02 31 The VulnCheck 2022 Exploited Vulnerability Report - A Year Long Review of the CISA KEV Catalog - Blog - VulnCheck
Details Website 2021-01-01 6 RIG EK Achieves Lifetime High Success Rate with Old IE Bugs | Cyware Hacker News
Details Pdf 2019-07-23 29 Bestsellers in the Underground Economy: Measuring Malware Popularity by Forum
Details Website 2017-11-16 69 Investigation Report for the September 2014 Equation malware detection incident in the US
Details Pdf 2017-02-23 139 Microsoft Security Intelligence Report
Details Website 2016-09-26 4 Modern browsers are closing the door on Java exploits, but some threats remain - Microsoft Security Blog
Details Pdf 2015-11-20 164 Microsoft Security Intelligence Report
Details Pdf 2015-05-08 94 Bad Ads and Zero Days: Reemerging Threats Challenge Trust in Supply Chains and Best Practices
Details Pdf 2015-03-24 32 EVOLUTION OF EXPLOIT KITS
Details Website 2015-02-04 23 An In-depth analysis of the Fiesta Exploit Kit: An infection in 2015
Details Website 2014-10-09 15 Evolution of the Nuclear Exploit Kit
Details Website 2013-11-07 92 Magnitude EK : Pop Pop !
Details Pdf 2013-10-28 13 KaspersKy Lab report
Details Pdf 2013-10-28 12 Proofpoint Threat Report
Details Pdf 2013-10-02 18 An automatic analysis and detection tool for Java exploits
Details Pdf 2013-03-20 100 The ‘TeamSpy’ Story - Abusing TeamViewer in Cyberespionage Campaigns
Details Website 2013-01-20 28 Meet "Red Dot exploit toolkit"
Details Website 2012-12-27 46 Crossing the Styx ( Styx Sploit Pack 2.0 ) - Meet CVE-2012-4969 via JS heapspray
Details Pdf 2012-12-03 125 Dec-2012.indd
Details Website 2012-12-01 28 Juice the Sweet Orange - 2012-12
Details Website 2012-11-27 27 Meet ProPack Exploit Pack - yes that's a lot of pack
Details Website 2012-11-12 9 “Blackhole” Exploit Kit Activity Peaks as Exploit Activity on the Internet Reaches New Heights - Microsoft Security Blog
Details Website 2012-10-24 5 The threat landscape in Canada & SecTor 2012 - Microsoft Security Blog
Details Pdf 2012-10-23 110 Detecting APT Activity with Network Traffic Analysis