🛡 Hogar Sector Finance
Sector Finance Timeframe: -28 days
Default Categories (81): Access Management Software, Accounting Software, Anti-Malware Software, Anti-Spam Software, Application Server Software, Appointment Software, Asset Management Software, Atlassian Confluence Plugin, Atlassian Jira App Software, Backup Software, Banking Software, Big Data Software, Billing Software, Bug Tracking Software, Business Process Management Software, Calendar Software, Cloud Software, Communications System, Connectivity Software, Continuous Integration Software, Customer Relationship Management System, Data Loss Prevention Software, Database Administration Software, Database Software, Directory Service Software, Document Management Software, Document Processing Software, Document Reader Software, Domain Name Software, Endpoint Management Software, Enterprise Resource Planning Software, File Compression Software, File Transfer Software, Financial Software, Firewall Software, Firmware Software, Groupware Software, Hardware Driver Software, Human Capital Management Software, Information Management Software, IP Phone Software, JavaScript Library, Knowledge Base Software, Log Management Software, Mail Client Software, Mail Server Software, Middleware, Network Attached Storage Software, Network Authentication Software, Network Encryption Software, Network Management Software, Network Routing Software, Office Suite Software, Operating System, Policy Management Software, Presentation Software, Printing Software, Programming Language Software, Project Management Software, Remote Access Software, Reporting Software, Risk Management System, Router Operating System, Security Testing Software, Server Management Software, Service Management Software, Smartphone Operating System, Software Library, Software Management Software, Solution Stack Software, Spreadsheet Software, SSH Server Software, Ticket Tracking Software, Unified Communication Software, Video Surveillance Software, Virtualization Software, Web Browser, Web Server, Windowing System Software, Wireless LAN Software, Word Processing Software
Linux Kernel 372 Microsoft Windows 84 Foxit PDF Reader 46 Juniper Junos OS 28 Microsoft SQL Server 28
Official Fix 902 Temporary Fix 0 Workaround 2 Unavailable 0 Not Defined 128
High 4 Functional 2 Proof-of-Concept 38 Unproven 112 Not Defined 876
Not Defined 0 Physical 12 Local 150 Adjacent 396 Network 474
Not Defined 0 High 104 Low 590 None 338
Not Defined 0 Required 226 None 806
≤1 0 ≤2 0 ≤3 18 ≤4 74 ≤5 262 ≤6 296 ≤7 180 ≤8 138 ≤9 58 ≤10 6
≤1 0 ≤2 0 ≤3 20 ≤4 80 ≤5 256 ≤6 418 ≤7 126 ≤8 106 ≤9 20 ≤10 6
≤1 0 ≤2 0 ≤3 24 ≤4 98 ≤5 246 ≤6 292 ≤7 186 ≤8 130 ≤9 50 ≤10 6
≤1 1032 ≤2 0 ≤3 0 ≤4 0 ≤5 0 ≤6 0 ≤7 0 ≤8 0 ≤9 0 ≤10 0
≤1 726 ≤2 2 ≤3 10 ≤4 6 ≤5 56 ≤6 66 ≤7 48 ≤8 68 ≤9 40 ≤10 10
≤1 914 ≤2 0 ≤3 0 ≤4 0 ≤5 4 ≤6 6 ≤7 30 ≤8 44 ≤9 34 ≤10 0
<1k 22 <2k 208 <5k 46 <10k 442 <25k 174 <50k 124 <100k 16 ≥100k 0
<1k 346 <2k 274 <5k 196 <10k 116 <25k 90 <50k 10 <100k 0 ≥100k 0
IOB - Indicator of Behavior (1000) Interesar Linux Kernel 50 Google Chrome 16 Mozilla Firefox 14 Oracle VM VirtualBox 10 Cisco IOS XE 10
Vulnerabilidad IOC - Indicator of Compromise (28) These indicators of compromise highlight associated network ranges which are known to be part of research and attack activities.
TTP - Tactics, Techniques, Procedures (26) Tactics, techniques, and procedures summarize the suspected MITRE ATT&CK techniques used. This data is unique as it uses our predictive model for actor profiling.
ID Technique Vulnerabilidad Vector de acceso Escribe Confianza 1 T1006 CWE-22, CWE-23, CWE-25, CWE-35 Path Traversal predictive Alto 2 T1040 CWE-319 Authentication Bypass by Capture-replay predictive Alto 3 T1055 CWE-74 Improper Neutralization of Data within XPath Expressions predictive Alto 4 T1059 CWE-88, CWE-94, CWE-1321 Argument Injection predictive Alto 5 T1059.007 CWE-79, CWE-80 Cross Site Scripting predictive Alto 6 T1068 CWE-250, CWE-269, CWE-274, CWE-284 Execution with Unnecessary Privileges predictive Alto 7 TXXXX.XXX CWE-XXX Xxx Xx Xxxx-xxxxx Xxxxxxxx predictive Alto 8 TXXXX.XXX CWE-XXX, CWE-XXX Xxxx-xxxxx Xxxxxxxxxxx predictive Alto 9 TXXXX CWE-XX, CWE-XX Xxxxxxx Xxxxx Xx Xxxxxxxxxx Xxxxxxxxxx Xxxxxxxxx predictive Alto 10 TXXXX.XXX CWE-XXX Xxxx Xxxxxxxx predictive Alto 11 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxxx Xxxxxx predictive Alto 12 TXXXX CWE-XX, CWE-XX Xxx Xxxxxxxxx predictive Alto 13 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxxxx predictive Alto 14 TXXXX CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxx Xxxxxxxxxx predictive Alto 15 TXXXX CWE-XXX Xxxxxxxxx Xxxxxxx Xx Xxxxxxxxx Xxxxxxxxxxx predictive Alto 16 TXXXX.XXX CWE-XXX Xxxxxxx Xxxxxxxxxx Xxx Xxxxxxxx Xxxxxxx Xx Xx-xxxx Xxxxxx Xxxxxxxx predictive Alto 17 TXXXX.XXX CWE-XXX Xxxxxxxxxxxx predictive Alto 18 TXXXX CWE-XXX, CWE-XXX Xxxxxxxxx Xxxxxx Xxxx predictive Alto 19 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxx Xxxx predictive Alto 20 TXXXX.XXX CWE-XXX Xxxxxxxx Xxxxxxxxxxx Xxxxxxxxxx predictive Alto 21 TXXXX CWE-XXX Xxxxxxxx Xx Xxxxxxx Xxxxxxxx Xxxxxxxxxxx Xx Xx Xxxxxxxxxxxx Xxxxx predictive Alto 22 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxx Xx Xxxxxxx Xxxxx Xxxxxxx Xxxxxxxxx Xxxxxxxxxxx predictive Alto 23 TXXXX CWE-XXX, CWE-XXX, CWE-XXX, CWE-XXX Xxxxxxxxxxxxx Xxxxxx predictive Alto 24 TXXXX.XXX CWE-XXX Xxx Xxxxxxxxxx Xxxxx predictive Alto 25 TXXXX.XXX CWE-XXX Xxxxxxxxxx Xxxxxxxxxxxxxx Xx Xxxxxxxx Xxxx Xxxxxxxxx predictive Alto 26 TXXXX CWE-XXX Xxxxxxxxxxx Xxxxxx predictive Alto