Common Information
Type | Value |
---|---|
Value |
Vulnerabilities - T1588.006 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2083-07-04 | 9 | SonicWall VPN Portal Critical Flaw (CVE-2020-5135) | ||
Details | Website | 2051-02-02 | 32 | UNKNOWN | ||
Details | Website | 2050-08-03 | 29 | Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com | ||
Details | Website | 2028-01-01 | 3 | A Tour of the Worm | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-10-24 | 7 | 每日安全动态推送(24/10/25) | CTF导航 | ||
Details | Website | 2025-01-01 | 11 | Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航 | ||
Details | Website | 2024-12-17 | 1 | Log4shell: a threat intelligence perspective — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-09 | 0 | — | ||
Details | Website | 2024-12-08 | 2 | Exploring Chrome’s CVE-2020-6418 – Part1 — Haboob | ||
Details | Website | 2024-11-30 | 4 | Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade | ||
Details | Website | 2024-11-21 | 2 | — | ||
Details | Website | 2024-11-17 | 0 | How Organizations Are Fulfilling CISA’s Secure by Design Pledge | ||
Details | Website | 2024-11-17 | 0 | OWASP Top 10–2021 Tryhackme Writeup | ||
Details | Website | 2024-11-17 | 0 | AI Model Robustness: A New Frontier in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | Reel Hacker vs Real Hacker | ||
Details | Website | 2024-11-17 | 0 | "Navigating the future of digital security: How evolving threats, advanced AI, and new protection… | ||
Details | Website | 2024-11-17 | 0 | Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility | ||
Details | Website | 2024-11-17 | 0 | Fixing Software Vulnerabilities Doesn’t Have to Be Hard — Here’s How to Do It Right | ||
Details | Website | 2024-11-17 | 0 | GZR Observer Daily — Nov 17, 2024 | ||
Details | Website | 2024-11-17 | 0 | The Importance of Cybersecurity in the Digital Age | ||
Details | Website | 2024-11-17 | 9 | CVE Alert: CVE-2024-9887 - RedPacket Security | ||
Details | Website | 2024-11-17 | 15 | Hunting for Default Credentials: A Deeper Dive into the Toolkit | ||
Details | Website | 2024-11-17 | 0 | Cybersecurity : Web Fuzzing | ||
Details | Website | 2024-11-17 | 0 | API Hacktics: Unveiling Vulnerabilities in Modern Web APIs |