Tactic | [Initial-access, Persistence] | 2 |
Technique | [Default Accounts, Boot or Logon Initialization Scripts, Web Shell, Shortcut Modification, Dynamic Linker Hijacking, Services File Permissions Weakness] | 6 |
CAPEC | [Try Common or Default Usernames and Passwords, Run Software at Logon, Upload a Web Shell to a Web Server, Symlink Attack, Subverting Environment Variable Values, Using Malicious Files] | 6 |
CWE | [Use of Hard-coded Credentials, Improper Access Control, Improper Authentication, Improper Link Resolution Before File Access (“Link Following”), Improper Neutralization of Special Elements in Output Used by a Downstream Component (“Injection”), Improper Input Validation, Exposure of Sensitive Information to an Unauthorized Actor, Incorrect Permission Assignment for Critical Resource] | 8 |
CVE | [CVE-2017-14143, CVE-2018-10575, CVE-2015-2509, CVE-2015-4624, CVE-2016-1543, CVE-2016-9722, CVE-2009-0695, CVE-2010-4279, CVE-2013-1080, CVE-2013-6117, CVE-2014-3139, CVE-2015-1486, CVE-2017-12477, CVE-2017-12478, CVE-2017-13872, CVE-2017-17560, CVE-2018-12613, CVE-2018-20735, CVE-2010-3847, CVE-2015-3315, CVE-2016-6253, CVE-2013-3214, CVE-2015-7309, CVE-2006-4842, CVE-2008-2683, CVE-2008-6791, CVE-2010-3904, CVE-2011-2763, CVE-2011-3496, CVE-2012-0267, CVE-2012-3399, CVE-2012-3485, CVE-2012-6554, CVE-2013-1362, CVE-2013-1892, CVE-2013-2143, CVE-2013-5045, CVE-2013-5576, CVE-2013-6282, CVE-2014-0038, CVE-2014-0257, CVE-2014-0476, CVE-2014-4114, CVE-2014-4971, CVE-2014-8361, CVE-2015-3245, CVE-2015-6567, CVE-2016-0792, CVE-2016-2098, CVE-2016-3087, CVE-2016-3088, CVE-2016-3714, CVE-2016-6433, CVE-2017-0143, CVE-2017-11346, CVE-2017-11394, CVE-2017-12500, CVE-2017-17562, CVE-2017-5638, CVE-2017-5816, CVE-2017-5817, CVE-2017-6316, CVE-2017-6516, CVE-2017-9791, CVE-2018-1000049, CVE-2018-11776, CVE-2018-5955, CVE-2018-7600, CVE-2011-3829, CVE-2012-3996, CVE-2013-0632, CVE-2015-2433, CVE-2016-4655, CVE-2016-9349, CVE-2017-17692, CVE-2018-6849, CVE-2018-9948, CVE-2019-1653, CVE-2011-3923] | 79 |
Metasploit | [Kaltura, Watchguard AP100 AP102 AP200 1.2.9.15, Microsoft Windows Media Center, Hak5 WiFi Pineapple 2.4, BMC Server Automation RSCD Agent, IBM QRadar SIEM, Wyse, Pandora FMS 3.1, Novell ZENworks Configuration Management 10 SP3/11 SP2, Dahua DVR 2.608.0000.0/2.608.GV00.0, Unitrends Enterprise Backup 7.3.0, Symantec Endpoint Protection Manager, Unitrends UEB 9, Unitrends UEB, Apple macOS 10.13.1 (High Sierra), Western Digital MyCloud, phpMyAdmin, BMC Patrol Agent, glibc, ABRT, NetBSD, vTiger CRM 5.4.0 SOAP, CMS Bolt, Solaris, Black Ice Cover Page SDK, PumpKIN TFTP Server 2.7.2.0, Linux 2.6.30 < 2.6.36, LifeSize Room, Measuresoft ScadaPro 4.0.0, NTR, Basilic 1.5.14, Tunnelblick, Active Collab ’chat module’ < 2.3.8, Nagios Remote Plugin Executor, MongoDB, Katello (RedHat Satellite), Microsoft Registry Symlink, Joomla! Component Media Manager, Google Android, Linux Kernel 3.13.1, Microsoft .NET Deployment Service, Chkrootkit, Microsoft Windows, Microsoft Bluetooth Personal Area Networking, Realtek SDK, Libuser, Wolf CMS 0.8.2, Jenkins, Ruby on Rails ActionPack Inline ERB, Apache Struts, ActiveMQ < 5.14.0, ImageMagick 6.9.3, Cisco Firepower Management Console 6.0, ManageEngine Desktop Central 10 Build 100087, Trend Micro OfficeScan 11.0/XG (12.0), HPE iMC 7.3, GoAhead Web Server 2.5 < 3.6.5, Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10, HPE iMC, Netscaler SD, MagniComp SysInfo, Apache Struts 2, Nanopool Claymore Dual Miner, GitStack, Drupal < 8.3.9 / < 8.4.6 / < 8.5.1, Support Incident Tracker 3.65, Tiki Wiki CMS Groupware 8.3, Adobe ColdFusion 9, WebKit, Advantech SUSIAccess < 3.0, Samsung Internet Browser, WebRTC, Foxit PDF Reader 9.0.1.1049, Cisco RV320 and RV325] | 74 |