Common Information
Type | Value |
---|---|
Value |
Vulnerabilities - T1588.006 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2083-07-04 | 9 | SonicWall VPN Portal Critical Flaw (CVE-2020-5135) | ||
Details | Website | 2051-02-02 | 32 | UNKNOWN | ||
Details | Website | 2050-08-03 | 29 | Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com | ||
Details | Website | 2037-10-13 | 14 | Abusing IP camera's for red teaming: Obtaining the firmware | ||
Details | Website | 2030-03-02 | 20 | APT QUARTERLY HIGHLIGHTS - Q3 : 2023 - CYFIRMA | ||
Details | Website | 2028-01-01 | 3 | A Tour of the Worm | ||
Details | Website | 2026-11-24 | 6 | 每日安全动态推送(24/11/26) | CTF导航 | ||
Details | Website | 2025-12-14 | 0 | 3 Tips for Eliminating Attack Surface Blind Spots | ||
Details | Website | 2025-12-13 | 0 | Best Practices for Securing Web Applications Against Modern… | ||
Details | Website | 2025-11-27 | 0 | The Ransomware Threat: Preparing Schools and Libraries for… | ||
Details | Website | 2025-11-27 | 0 | How Agentic AI Is Transforming Enterprise Software… | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-11-03 | 0 | CIS Advisories | ||
Details | Website | 2025-10-24 | 7 | 每日安全动态推送(24/10/25) | CTF导航 | ||
Details | Website | 2025-04-18 | 4 | Commonly Probed Webshell URLs - SANS Internet Storm Center | ||
Details | Website | 2025-04-18 | 60 | Microsoft Patch Tuesday: March 2025 - SANS Internet Storm Center | ||
Details | Website | 2025-04-18 | 3 | Scans for VMWare Hybrid Cloud Extension (HCX) API (Log4j - not brute forcing) - SANS Internet Storm Center | ||
Details | Website | 2025-04-18 | 11 | Mirai Bot now incroporating (malformed?) DrayTek Vigor Router Exploits - SANS Internet Storm Center | ||
Details | Website | 2025-04-18 | 16 | Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440 - SANS Internet Storm Center | ||
Details | Website | 2025-04-18 | 15 | Let's Talk About HTTP Headers. - SANS Internet Storm Center | ||
Details | Website | 2025-03-24 | 2 | WordPress Plugin Flaw Puts 200,000+ Sites at Risk of Code Execution | ||
Details | Website | 2025-03-24 | 0 | RaaS: The new frontier of cybercrime | ||
Details | Website | 2025-03-24 | 1 | New Browser-Based RDP Tool Enables Secure Remote Access to Windows Servers | ||
Details | Website | 2025-03-24 | 25 | The SOS Intelligence CVE Chatter Weekly Top Ten - 24 March 2025 - SOS Intelligence | ||
Details | Website | 2025-03-24 | 0 | Oracle Cloud denies data breach claims of 6 million data files leak - Cybersecurity Insiders |