Common Information
Type | Value |
---|---|
Value |
Vulnerabilities - T1588.006 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may acquire information about vulnerabilities that can be used during targeting. A vulnerability is a weakness in computer hardware or software that can, potentially, be exploited by an adversary to cause unintended or unanticipated behavior to occur. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases.(Citation: National Vulnerability Database) An adversary may monitor vulnerability disclosures/databases to understand the state of existing, as well as newly discovered, vulnerabilities. There is usually a delay between when a vulnerability is discovered and when it is made public. An adversary may target the systems of those known to conduct vulnerability research (including commercial vendors). Knowledge of a vulnerability may cause an adversary to search for an existing exploit (i.e. [Exploits](https://attack.mitre.org/techniques/T1588/005)) or to attempt to develop one themselves (i.e. [Exploits](https://attack.mitre.org/techniques/T1587/004)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | — | 0 | New SolarWinds Orion Vulnerabilities Disclosed - IBM X-Force Collection | ||
Details | Website | — | 0 | Microsoft Security Update for Edge - IBM X-Force Collection | ||
Details | Website | — | 0 | Mozilla Security Advisory for Thunderbird - IBM X-Force Collection | ||
Details | Website | — | 0 | Multiple Vulnerabilities in Exim Disclosed - IBM X-Force Collection | ||
Details | Website | — | 0 | Home user guidance to manage processor vulnerabilities ‘Meltdown’ and ‘Spectre’ | ||
Details | Website | — | 0 | Critical Nagios Vulnerabilities - IBM X-Force Collection | ||
Details | Website | — | 0 | SAP Applications Facing Critical Vulnerabilities - IBM X-Force Collection | ||
Details | Website | — | 0 | Multiple RCE Vulnerabilities in PTC Axeda Agent - IBM X-Force Collection | ||
Details | Website | — | 0 | VEEAM Backup and Replication Vulnerability - IBM X-Force Collection | ||
Details | Website | — | 0 | Critical VMWare Vulnerabilities - IBM X-Force Collection | ||
Details | Website | — | 0 | WhatsApp Zero-Day - IBM X-Force Collection | ||
Details | Website | — | 0 | Critical Vulnerabilities in VMware Workspace ONE Assist - IBM X-Force Collection | ||
Details | Website | — | 0 | Critical Command Injection Bug on Cisco IP Phones - IBM X-Force Collection | ||
Details | Website | — | 0 | Equities process | ||
Details | Website | — | 0 | Critical Vulnerability in Citrix ADC and Gateway - IBM X-Force Collection | ||
Details | Website | — | 0 | High Severity Vulnerability Disclosed and Fixed in curl 8.4.0 - IBM X-Force Collection | ||
Details | Website | — | 0 | Meltdown' and 'Spectre' guidance | ||
Details | Website | — | 0 | Vulnerability management | ||
Details | Website | — | 0 | Firmware bugs are like buses | ||
Details | Website | — | 0 | Why vulnerabilities are like buses | ||
Details | Website | — | 1 | Password Managers. | ||
Details | Website | — | 6 | Exploiting A Tricky SQL Injection With sqlmap | pentestmonkey | ||
Details | Website | — | 4 | UNKNOWN | ||
Details | Website | — | 8 | UNKNOWN | ||
Details | Website | — | 57 | UNKNOWN |