Common Information
Type | Value |
---|---|
Value |
Exploit Public-Facing Application - T1190 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | The use of software, data, or commands to take advantage of a weakness in an Internet-facing computer system or program in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL) (Citation: NVD CVE-2016-6662), standard services (like SMB (Citation: CIS Multiple SMB Vulnerabilities) or SSH), and any other applications with Internet accessible open sockets, such as web servers and related services. (Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include Exploitation for Defense Evasion. For websites and databases, the OWASP top 10 gives a good list of the top 10 most common web-based vulnerabilities. (Citation: OWASP Top 10) Detection: Monitor application logs for abnormal behavior that may indicate attempted or successful exploitation. Use deep packet inspection to look for artifacts of common exploit traffic, such as SQL injection. Web Application Firewalls may detect improper inputs attempting exploitation. Platforms: Linux, Windows, macOS Data Sources: Application logs, Packet capture, Web logs, Web application firewall logs |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-07-02 | 5 | Pentesting results for 2023 | ||
Details | Website | 2024-07-01 | 4 | A Vulnerability in OpenSSH Could Allow for Remote Code Execution | ||
Details | Website | 2024-06-28 | 41 | Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer | ||
Details | Website | 2024-06-25 | 3 | Multiple Vulnerabilities in Progress MOVEit Products Could Allow for Authentication Bypass | ||
Details | Website | 2024-06-24 | 24 | Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation | Recorded Future | ||
Details | Website | 2024-06-18 | 4 | Multiple Vulnerabilities in VMware Products Could Allow for Remote Code Execution | ||
Details | Website | 2024-06-07 | 22 | DERO cryptojacking adopts new techniques to evade detection | Wiz Blog | ||
Details | Website | 2024-06-06 | 9 | Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers | ||
Details | Website | 2024-06-06 | 9 | Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers | ||
Details | Website | 2024-06-04 | 3 | Multiple Vulnerabilities in Progress Telerik Report Server Could Allow for Remote Code Execution | ||
Details | Website | 2024-06-01 | 48 | Ngioweb Remains Active 7 Years Later | ||
Details | Website | 2024-05-30 | 4 | Multiple Vulnerabilities in LenelS2 NetBox Could Allow for Arbitrary Code Execution | ||
Details | Website | 2024-05-30 | 18 | Decoding Water Sigbin's Latest Obfuscation Tricks | ||
Details | Website | 2024-05-30 | 19 | Decoding Water Sigbin's Latest Obfuscation Tricks | ||
Details | Website | 2024-05-23 | 1 | A Vulnerability in GitHub Enterprise Server (GHES) Could Allow for Authentication Bypass | ||
Details | Website | 2024-05-11 | 12 | Healthcare's Black Basta Bash | ||
Details | Website | 2024-05-10 | 256 | #StopRansomware: Black Basta | CISA | ||
Details | Website | 2024-05-09 | 2 | A Vulnerability in F5 BIG-IP Next Central Manager Could Allow for Remote Code Execution | ||
Details | Website | 2024-05-09 | 2 | A Vulnerability in F5 BIG-IP Next Central Manager Could Allow for Remote Code Execution | ||
Details | Website | 2024-04-21 | 21 | CVE-2024-3400: Critical Palo Alto PAN-OS Command Injection Vulnerability Exploited by Sysrv Botnet's XMRig Malware | ||
Details | Website | 2024-03-28 | 21 | MSSQL to ScreenConnect | Huntress | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-03-13 | 3 | Threat Intelligence for Financial Services | Recorded Future | ||
Details | Website | 2024-03-06 | 59 | Тень пентестера: эксперты F.A.C.C.T. исследовали неизвестные атаки вымогателей Shadow |