🛡 Start Sektor Industry
Sektor Industry Timeframe: -28 days
Default Categories (66): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Automation Software, Backup Software, Billing Software, Business Process Management Software, Calendar Software, Chip Software, Cloud Software, Communications System, Connectivity Software, Customer Relationship Management System, Database Administration Software, Database Software, Directory Service Software, Document Management Software, Document Reader Software, Endpoint Management Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Image Processing Software, Information Management Software, IP Phone Software, Knowledge Base Software, Log Management Software, Mail Client Software, Mail Server Software, Middleware, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Office Suite Software, Operating System, Presentation Software, Printing Software, Product Lifecycle Management Software, Project Management Software, Remote Access Software, Reporting Software, Router Operating System, SCADA Software, Server Management Software, Service Management Software, Software Library, Software Management Software, Spreadsheet Software, SSH Server Software, Supplier Relationship Management Software, Supply Chain Management Software, Virtualization Software, Warehouse Management System Software, Web Browser, Web Server, Windowing System Software, Wireless LAN Software, Word Processing Software
Linux Kernel 376 Microsoft Windows 100 Foxit PDF Reader 56 Juniper Junos OS 30 MediaTek MT8765 26
Official Fix 892 Temporary Fix 0 Workaround 2 Unavailable 0 Not Defined 110
High 6 Functional 2 Proof-of-Concept 30 Unproven 120 Not Defined 846
Not Defined 0 Physical 4 Local 160 Adjacent 406 Network 434
Not Defined 0 High 114 Low 564 None 326
Not Defined 0 Required 214 None 790
≤1 0 ≤2 0 ≤3 34 ≤4 60 ≤5 250 ≤6 294 ≤7 152 ≤8 148 ≤9 60 ≤10 6
≤1 0 ≤2 0 ≤3 34 ≤4 82 ≤5 238 ≤6 394 ≤7 116 ≤8 114 ≤9 20 ≤10 6
≤1 0 ≤2 2 ≤3 46 ≤4 82 ≤5 232 ≤6 282 ≤7 160 ≤8 148 ≤9 46 ≤10 6
≤1 1004 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 734 ≤2 0 ≤3 6 ≤4 4 ≤5 48 ≤6 62 ≤7 44 ≤8 66 ≤9 30 ≤10 10
≤1 876 ≤2 0 ≤3 0 ≤4 0 ≤5 2 ≤6 14 ≤7 22 ≤8 54 ≤9 36 ≤10 0
<1k 44 <2k 182 <5k 44 <10k 478 <25k 128 <50k 112 <100k 16 ≥100k 0
<1k 368 <2k 266 <5k 180 <10k 94 <25k 84 <50k 12 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Interesse Linux Kernel 38 Google Chrome 18 Microsoft Windows 14 Microsoft OLE DB Driver 8 Microsoft SQL Server 8
Schwachstellen IOC - Indicator of Compromise (22) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (26) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Schwachstellen Zugriffsart Typ Akzeptanz 1 T1006 CWE-22, CWE-23, CWE-35 Path Traversal prädiktiv High 2 T1040 CWE-319 Authentication Bypass by Capture-replay prädiktiv High 3 T1055 CWE-74 Improper Neutralization of Data within XPath Expressions prädiktiv High 4 T1059 CWE-88, CWE-94, CWE-1321 Argument Injection prädiktiv High 5 T1059.007 CWE-79, CWE-80 Cross Site Scripting prädiktiv High 6 T1068 CWE-250, CWE-269, CWE-274, CWE-284 Execution with Unnecessary Privileges prädiktiv High 7 TXXXX.XXX CWE-XXX Xxx Xx Xxxx-xxxxx Xxxxxxxx prädiktiv High 8 TXXXX.XXX CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx prädiktiv High 9 TXXXX CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx prädiktiv High 10 TXXXX.XXX CWE-XXX Xxxx Xxxxxxxx prädiktiv High 11 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx prädiktiv High 12 TXXXX CWE-XX, CWE-XX Xxx Xxxxxxxxx prädiktiv High 13 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx prädiktiv High 14 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 15 TXXXX CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 16 TXXXX.XXX CWE-XXX Xxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxx prädiktiv High 17 TXXXX.XXX CWE-XXX Xxxxxxxxxxxx prädiktiv High 18 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxx Xxxx prädiktiv High 19 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxx Xxxx prädiktiv High 20 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx prädiktiv High 21 TXXXX CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx prädiktiv High 22 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx prädiktiv High 23 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx prädiktiv High 24 TXXXX.XXX CWE-XXX Xxx Xxxxxxxxxx Xxxxx prädiktiv High 25 TXXXX.XXX CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx prädiktiv High 26 TXXXX CWE-XXX Xxxxxxxxxxx Xxxxxx prädiktiv High