🛡 Hem Sektor Finance
Sektor Finance Timeframe: -28 days
Default Categories (81): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Appointment Software, Asset Management Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Backup Software, Banking Software, Big Data Software, Billing Software, Bug Tracking Software, Business Process Management Software, Calendar Software, Cloud Software, Communications System, Connectivity Software, Continuous Integration Software, Customer Relationship Management System, Data Loss Prevention Software, Database Administration Software, Database Software, Directory Service Software, Document Management Software, Document Processing Software, Document Reader Software, Domain Name Software, Endpoint Management Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Human Capital Management Software, Information Management Software, IP Phone Software, JavaScript Library, Knowledge Base Software, Log Management Software, Mail Client Software, Mail Server Software, Middleware, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Office Suite Software, Operating System, Policy Management Software, Presentation Software, Printing Software, Programming Language Software, Project Management Software, Remote Access Software, Reporting Software, Risk Management System, Router Operating System, Security Testing Software, Server Management Software, Service Management Software, Smartphone Operating System, Software Library, Software Management Software, Solution Stack Software, Spreadsheet Software, SSH Server Software, Ticket Tracking Software, Unified Communication Software, Video Surveillance Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Wireless LAN Software, Word Processing Software
Linux Kernel 452 Microsoft Windows 90 Microsoft SQL Server 26 Google Chrome 26 Oracle MySQL Server 24
Official Fix 880 Temporary Fix 0 Workaround 0 Unavailable 0 Not Defined 144
High 14 Functional 2 Proof-of-Concept 30 Unproven 118 Not Defined 860
Not Defined 0 Physical 4 Local 134 Adjacent 502 Network 384
Not Defined 0 High 88 Low 682 None 254
Not Defined 0 Required 146 None 878
≤1 0 ≤2 0 ≤3 28 ≤4 100 ≤5 228 ≤6 318 ≤7 126 ≤8 148 ≤9 72 ≤10 4
≤1 0 ≤2 0 ≤3 30 ≤4 106 ≤5 224 ≤6 380 ≤7 134 ≤8 122 ≤9 24 ≤10 4
≤1 0 ≤2 2 ≤3 32 ≤4 120 ≤5 226 ≤6 302 ≤7 132 ≤8 146 ≤9 58 ≤10 6
≤1 1024 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 762 ≤2 2 ≤3 8 ≤4 10 ≤5 54 ≤6 42 ≤7 28 ≤8 68 ≤9 40 ≤10 10
≤1 892 ≤2 0 ≤3 0 ≤4 0 ≤5 2 ≤6 10 ≤7 26 ≤8 48 ≤9 46 ≤10 0
<1k 22 <2k 180 <5k 34 <10k 526 <25k 126 <50k 110 <100k 26 ≥100k 0
<1k 366 <2k 260 <5k 196 <10k 94 <25k 98 <50k 10 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Intressera Linux Kernel 130 Microsoft Windows 10 SourceCodester Online Library System 6 GitLab Community Edition 6 GitLab Enterprise Edition 6
Sårbarheter IOC - Indicator of Compromise (22) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (23) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Klass Sårbarheter Åtkomstvektor Typ Förtroende 1 T1006 CAPEC-126 CWE-22, CWE-23, CWE-25, CWE-35 Path Traversal predictive Hög 2 T1040 CAPEC-102 CWE-319 Authentication Bypass by Capture-replay predictive Hög 3 T1055 CAPEC-10 CWE-74 Improper Neutralization of Data within XPath Expressions predictive Hög 4 T1059 CAPEC-137 CWE-88, CWE-94, CWE-1321 Argument Injection predictive Hög 5 T1059.007 CAPEC-209 CWE-79, CWE-80 Cross Site Scripting predictive Hög 6 TXXXX CAPEC-122 CWE-XXX, CWE-XXX Xxxxxxxxx Xxxx Xxxxxxxxxxx Xxxxxxxxxx predictive Hög 7 TXXXX.XXX CAPEC- CWE-XXX Xxx Xx Xxxx-xxxxx Xxxxxxxx predictive Hög 8 TXXXX.XXX CAPEC-16 CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx predictive Hög 9 TXXXX CAPEC-136 CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx predictive Hög 10 TXXXX CAPEC-1 CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx predictive Hög 11 TXXXX CAPEC-108 CWE-XX Xxx Xxxxxxxxx predictive Hög 12 TXXXX.XXX CAPEC-1 CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx predictive Hög 13 TXXXX CAPEC-102 CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx predictive Hög 14 TXXXX CAPEC-37 CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx predictive Hög 15 TXXXX.XXX CAPEC-154 CWE-XXX Xxxxxxxxxxxx predictive Hög 16 TXXXX CAPEC-38 CWE-XXX Xxxxxxxxx Xxxxxx Xxxx predictive Hög 17 TXXXX.XXX CAPEC- CWE-XXX Xxxxxxxx Xxxxxx Xxxx predictive Hög 18 TXXXX.XXX CAPEC-459 CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx predictive Hög 19 TXXXX CAPEC-464 CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx predictive Hög 20 TXXXX CAPEC-116 CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx predictive Hög 21 TXXXX CAPEC-112 CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx predictive Hög 22 TXXXX.XXX CAPEC- CWE-XXX Xxx Xxxxxxxxxx Xxxxx predictive Hög 23 TXXXX.XXX CAPEC-1 CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx predictive Hög