Evernote For Windows Read Local File and Command Execute Vulnerabilities
Tags
attack-pattern: | Javascript - T1059.007 Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | d0cf00c2-92eb-4ce6-bcc2-14ca30bbb90d |
Fingerprint | a41c4cf8ffa714c2 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 5, 2018, midnight |
Added to db | Feb. 17, 2023, 11:37 p.m. |
Last updated | Nov. 17, 2024, 11:36 p.m. |
Headline | Evernote For Windows Read Local File and Command Execute Vulnerabilities |
Title | Evernote For Windows Read Local File and Command Execute Vulnerabilities |
Detected Hints/Tags/Attributes | 23/1/19 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://paper.seebug.org/737/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 1 | cve-2018-18524 |
|
Details | Domain | 1 | windows.it |
|
Details | Domain | 1 | problem.so |
|
Details | Domain | 1175 | gmail.com |
|
Details | Domain | 2 | evernote.com |
|
Details | Domain | 23 | paper.seebug.org |
|
Details | 1 | n4n@gmail.com |
||
Details | 1 | security@evernote.com |
||
Details | File | 8 | c:\windows\win.ini |
|
Details | File | 312 | calc.exe |
|
Details | File | 19 | 1.js |
|
Details | File | 2 | math.js |
|
Details | File | 1 | c:\\\\windows\\win.ini |
|
Details | File | 4 | process.bin |
|
Details | File | 58 | win.ini |
|
Details | File | 1 | c:\\\\windows\\system32\\calc.exe |
|
Details | IPv4 | 1 | 172.16.4.1 |
|
Details | Url | 1 | http://172.16.4.1:8000/1.js">.jpg |
|
Details | Url | 1 | https://paper.seebug.org/737 |