Common Information
Type Value
Value
Vulnerabilities - T1588.006
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)).
Details Published Attributes CTI Title
Details Website 2083-07-04 9 SonicWall VPN Portal Critical Flaw (CVE-2020-5135)
Details Website 2051-02-02 32 UNKNOWN
Details Website 2050-08-03 29 Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com
Details Website 2028-01-01 3 A Tour of the Worm
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2025-10-24 7 每日安全动态推送(24/10/25) | CTF导航
Details Website 2025-01-01 11 Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航
Details Website 2024-12-17 1 Log4shell: a threat intelligence perspective — Silent Push Threat Intelligence
Details Website 2024-12-09 0
Details Website 2024-12-08 2 Exploring Chrome’s CVE-2020-6418 – Part1 — Haboob
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-21 2
Details Website 2024-11-17 0 Impact of Organizational and Team Dynamics on Threat Hunting as an ISSMP
Details Website 2024-11-17 1 Solid Security Pro Review
Details Website 2024-11-17 0 How Organizations Are Fulfilling CISA’s Secure by Design Pledge
Details Website 2024-11-17 0 OWASP Top 10–2021 Tryhackme Writeup
Details Website 2024-11-17 0 AI Model Robustness: A New Frontier in Cybersecurity
Details Website 2024-11-17 0 Reel Hacker vs Real Hacker
Details Website 2024-11-17 0 "Navigating the future of digital security: How evolving threats, advanced AI, and new protection…
Details Website 2024-11-17 0 Cybersecurity in Autonomous Vehicles: Safeguarding the Future of Mobility
Details Website 2024-11-17 0 Fixing Software Vulnerabilities Doesn’t Have to Be Hard — Here’s How to Do It Right
Details Website 2024-11-17 0 GZR Observer Daily — Nov 17, 2024
Details Website 2024-11-17 0 The Importance of Cybersecurity in the Digital Age
Details Website 2024-11-17 9 CVE Alert: CVE-2024-9887 - RedPacket Security
Details Website 2024-11-17 15 Hunting for Default Credentials: A Deeper Dive into the Toolkit