Common Information
Type Value
Value
Exploit Public-Facing Application
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to exploit public-facing applications to leverage weaknesses on Internet-facing computer systems, programs, or assets in order to cause unintended or unexpected behavior. These public-facing applications may include user interfaces, software, data, or commands. In particular, a public-facing application in the IT environment may provide adversaries an interface into the OT environment. ICS-CERT analysis has identified the probable initial infection vector for systems running GE’s Cimplicity HMI with a direct connection to the Internet.
Details Published Attributes CTI Title
Details Website 2025-02-11 12 Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
Details Website 2025-02-06 2 A Vulnerability in Trimble Cityworks Could Allow for Remote Code Execution
Details Website 2025-02-03 77 XE Group: From Credit Card Skimming to Exploiting Zero-Days
Details Website 2025-02-03 3 Cyber Kill Chain : A Step By Step Guide To Complete The Tasks of The Room In 2025 (Tryhackme).
Details Website 2025-02-02 5 Cyber Kill Chain | TryHackMe — Walkthrough
Details Website 2025-01-30 4 Multiple Vulnerabilities in SimpleHelp RMM Could Allow for Arbitrary Code Execution
Details Website 2025-01-29 4 Critical Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances
Details Website 2025-01-26 2 A Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances Could Allow for Remote Code Execution
Details Website 2025-01-24 12 Practical Application of the MITRE ATT&CK Framework for SOC/Cybersecurity Analysts: Mapping…
Details Website 2025-01-23 164 The Feed 2025–01–23
Details Website 2025-01-23 33 Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
Details Website 2025-01-22 1 Demystifying Cyber Attacks with MITRE ATT&CK Framework
Details Website 2025-01-22 111 PlushDaemon compromises supply chain of Korean VPN service
Details Website 2025-01-20 10 How I Turned a $10 RFI Bug into a $300 RCE Bounty (Step-by-Step Guide)
Details Website 2025-01-20 42 Zyxel vulnerability exploited by "Helldown" ransomware group
Details Website 2025-01-16 345 The Feed 2025–01–16
Details Website 2025-01-15 7 Multiple Vulnerabilities in Rsync Could Allow for Remote Code Execution
Details Website 2025-01-14 4 Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Authentication Bypass
Details Website 2025-01-14 4 Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
Details Website 2025-01-10 30 Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls ? Arctic Wolf
Details Website 2025-01-10 30 Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls - Arctic Wolf
Details Website 2025-01-09 3 Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
Details Website 2025-01-09 6 Multiple vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication.
Details Website 2025-01-06 26 Strengthen your enterprise security posture with MITRE ATT&CK mapping to Cloud Browser Isolation controls
Details Website 2024-12-29 8 Securing AI Systems with MITRE ATLAS