automation |
MISP/40f8e511-0605-4f1c-8112-5fe43ed25af0 |
CVE-2019-13608 |
seen |
2021-02-01 14:56:26 +0000 |
|
automation |
MISP/40f8e511-0605-4f1c-8112-5fe43ed25af0 |
CVE-2020-8270 |
seen |
2021-02-01 14:56:23 +0000 |
|
automation |
MISP/2041c7d8-c717-4439-b5e6-1000b8ffa5d5 |
CVE-2017-10271 |
seen |
2021-01-29 10:56:28 +0000 |
|
automation |
MISP/2041c7d8-c717-4439-b5e6-1000b8ffa5d5 |
CVE-2016-3088 |
seen |
2021-01-29 10:56:00 +0000 |
|
automation |
https://www.exploit-db.com/exploits/49474 |
CVE-2020-35729 |
exploited |
2021-01-25 00:00:00 +0000 |
|
automation |
https://www.exploit-db.com/exploits/49450 |
CVE-2020-35749 |
exploited |
2021-01-21 00:00:00 +0000 |
|
automation |
https://msrc.microsoft.com/blog/2021/01/netlogon-domain-controller-enforcement-mode-is-enabled-by-default-beginning-with-the-february-9-2021-security-update-related-to-cve-2020-1472/ |
CVE-2020-1472 |
seen |
2021-01-14 07:00:00 +0000 |
|
automation |
https://www.exploit-db.com/exploits/49398 |
CVE-2020-17519 |
exploited |
2021-01-08 00:00:00 +0000 |
|
automation |
https://www.exploit-db.com/exploits/49385 |
CVE-2020-10199 |
exploited |
2021-01-06 00:00:00 +0000 |
|
automation |
https://www.exploit-db.com/exploits/49383 |
CVE-2019-11229 |
exploited |
2021-01-06 00:00:00 +0000 |
|