[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2024-42010":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-28T13:22:40.146Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":1074,"aliases":1075,"duplicate_of":9,"upstream":1076,"downstream":1077,"duplicates":1092,"related":1093,"reserved_at":9,"published_at":1097,"modified_at":1098,"state":1099,"summary":1100,"references_raw":1109,"kevs":1131,"epss":1132,"epss_history":1135,"metrics":1394,"affected":1402},"CVE-2024-42010","mod_css_styles in Roundcube through 1.5.7 and 1.6.x through 1.6.7 insufficiently filters Cascading Style Sheets (CSS) token sequences in rendered e-mail messages, allowing a remote attacker to obtain sensitive information.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-200","Exposure of Sensitive Information to an Unauthorized Actor","The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.","weakness","Draft","Class","High",[20,24,208,234,238,242,246,250,254,258,348,352,356,378,382,386,390,394,404,408,412,416,420,424,428,432,436,500,504,530,552,556,560,564,568,572,576,580,584,588,592,596,600,604,608,612,644,648,670,692,738,764,864,868,993,1030,1040,1050,1070],{"id":21,"name":22,"techniques":23},"CAPEC-116","Excavation",[],{"id":25,"name":26,"techniques":27},"CAPEC-13","Subverting Environment Variable Values",[28,126,168],{"id":29,"name":30,"tactics":31,"countermeasures":38},"T1562.003","Impair Command History Logging",[32,35],{"id":33,"name":34},"TA0030","Defense Evasion",{"id":36,"name":37},"TA0005","Stealth",[39,44,49,53,57,61,66,70,75,80,84,88,93,97,102,106,110,114,118,122],{"id":40,"name":41,"tactic":42},"D3-CI","Configuration Inventory",{"name":43},"Model",{"id":45,"name":46,"tactic":47},"D3-FA","File Analysis",{"name":48},"Detect",{"id":50,"name":51,"tactic":52},"D3-FIM","File Integrity Monitoring",{"name":48},{"id":54,"name":55,"tactic":56},"D3-DA","Dynamic Analysis",{"name":48},{"id":58,"name":59,"tactic":60},"D3-EFA","Emulated File Analysis",{"name":48},{"id":62,"name":63,"tactic":64},"D3-FEV","File Eviction",{"name":65},"Evict",{"id":67,"name":68,"tactic":69},"D3-RKD","Registry Key Deletion",{"name":65},{"id":71,"name":72,"tactic":73},"D3-DF","Decoy File",{"name":74},"Deceive",{"id":76,"name":77,"tactic":78},"D3-DRA","Disable Remote Access",{"name":79},"Harden",{"id":81,"name":82,"tactic":83},"D3-ACH","Application Configuration Hardening",{"name":79},{"id":85,"name":86,"tactic":87},"D3-FE","File Encryption",{"name":79},{"id":89,"name":90,"tactic":91},"D3-RC","Restore Configuration",{"name":92},"Restore",{"id":94,"name":95,"tactic":96},"D3-RF","Restore File",{"name":92},{"id":98,"name":99,"tactic":100},"D3-CQ","Content Quarantine",{"name":101},"Isolate",{"id":103,"name":104,"tactic":105},"D3-CF","Content Filtering",{"name":101},{"id":107,"name":108,"tactic":109},"D3-LFP","Local File Permissions",{"name":101},{"id":111,"name":112,"tactic":113},"D3-RFAM","Remote File Access Mediation",{"name":101},{"id":115,"name":116,"tactic":117},"D3-CM","Content Modification",{"name":101},{"id":119,"name":120,"tactic":121},"D3-EAL","Executable Allowlisting",{"name":101},{"id":123,"name":124,"tactic":125},"D3-EDL","Executable Denylisting",{"name":101},{"id":127,"name":128,"tactics":129,"countermeasures":141},"T1574.006","Dynamic Linker Hijacking",[130,133,136,137,138],{"id":131,"name":132},"TA0110","Persistence",{"id":134,"name":135},"TA0111","Privilege Escalation",{"id":33,"name":34},{"id":36,"name":37},{"id":139,"name":140},"TA0104","Execution",[142,146,148,150,152,154,156,158,160,162,164,166],{"id":143,"name":144,"tactic":145},"D3-SFA","System File Analysis",{"name":48},{"id":45,"name":46,"tactic":147},{"name":48},{"id":50,"name":51,"tactic":149},{"name":48},{"id":62,"name":63,"tactic":151},{"name":65},{"id":71,"name":72,"tactic":153},{"name":74},{"id":85,"name":86,"tactic":155},{"name":79},{"id":94,"name":95,"tactic":157},{"name":92},{"id":103,"name":104,"tactic":159},{"name":101},{"id":107,"name":108,"tactic":161},{"name":101},{"id":111,"name":112,"tactic":163},{"name":101},{"id":98,"name":99,"tactic":165},{"name":101},{"id":115,"name":116,"tactic":167},{"name":101},{"id":169,"name":170,"tactics":171,"countermeasures":177},"T1574.007","Path Interception by PATH Environment Variable",[172,173,174,175,176],{"id":131,"name":132},{"id":134,"name":135},{"id":33,"name":34},{"id":36,"name":37},{"id":139,"name":140},[178,180,182,184,186,188,190,192,194,196,198,200,202,204,206],{"id":45,"name":46,"tactic":179},{"name":48},{"id":50,"name":51,"tactic":181},{"name":48},{"id":54,"name":55,"tactic":183},{"name":48},{"id":58,"name":59,"tactic":185},{"name":48},{"id":62,"name":63,"tactic":187},{"name":65},{"id":71,"name":72,"tactic":189},{"name":74},{"id":85,"name":86,"tactic":191},{"name":79},{"id":94,"name":95,"tactic":193},{"name":92},{"id":103,"name":104,"tactic":195},{"name":101},{"id":107,"name":108,"tactic":197},{"name":101},{"id":111,"name":112,"tactic":199},{"name":101},{"id":98,"name":99,"tactic":201},{"name":101},{"id":115,"name":116,"tactic":203},{"name":101},{"id":119,"name":120,"tactic":205},{"name":101},{"id":123,"name":124,"tactic":207},{"name":101},{"id":209,"name":210,"techniques":211},"CAPEC-169","Footprinting",[212,220,228],{"id":213,"name":214,"tactics":215,"countermeasures":219},"T1217","Browser Information Discovery",[216],{"id":217,"name":218},"TA0102","Discovery",[],{"id":221,"name":222,"tactics":223,"countermeasures":227},"T1592","Gather Victim Host Information",[224],{"id":225,"name":226},"TA0043","Reconnaissance",[],{"id":229,"name":230,"tactics":231,"countermeasures":233},"T1595","Active Scanning",[232],{"id":225,"name":226},[],{"id":235,"name":236,"techniques":237},"CAPEC-22","Exploiting Trust in Client",[],{"id":239,"name":240,"techniques":241},"CAPEC-224","Fingerprinting",[],{"id":243,"name":244,"techniques":245},"CAPEC-285","ICMP Echo Request Ping",[],{"id":247,"name":248,"techniques":249},"CAPEC-287","TCP SYN Scan",[],{"id":251,"name":252,"techniques":253},"CAPEC-290","Enumerate Mail Exchange (MX) Records",[],{"id":255,"name":256,"techniques":257},"CAPEC-291","DNS Zone Transfers",[],{"id":259,"name":260,"techniques":261},"CAPEC-292","Host Discovery",[262],{"id":263,"name":264,"tactics":265,"countermeasures":267},"T1018","Remote System Discovery",[266],{"id":217,"name":218},[268,272,274,276,278,282,286,290,294,298,302,306,310,314,316,318,320,322,326,328,330,332,334,336,340,342,344],{"id":269,"name":270,"tactic":271},"D3-SCA","System Call Analysis",{"name":48},{"id":143,"name":144,"tactic":273},{"name":48},{"id":45,"name":46,"tactic":275},{"name":48},{"id":50,"name":51,"tactic":277},{"name":48},{"id":279,"name":280,"tactic":281},"D3-UGLPA","User Geolocation Logon Pattern Analysis",{"name":48},{"id":283,"name":284,"tactic":285},"D3-PMAD","Protocol Metadata Anomaly Detection",{"name":48},{"id":287,"name":288,"tactic":289},"D3-CSPP","Client-server Payload Profiling",{"name":48},{"id":291,"name":292,"tactic":293},"D3-PHDURA","Per Host Download-Upload Ratio Analysis",{"name":48},{"id":295,"name":296,"tactic":297},"D3-NTSA","Network Traffic Signature Analysis",{"name":48},{"id":299,"name":300,"tactic":301},"D3-APCA","Application Protocol Command Analysis",{"name":48},{"id":303,"name":304,"tactic":305},"D3-NTCD","Network Traffic Community Deviation",{"name":48},{"id":307,"name":308,"tactic":309},"D3-RTSD","Remote Terminal Session Detection",{"name":48},{"id":311,"name":312,"tactic":313},"D3-PSA","Process Spawn Analysis",{"name":48},{"id":62,"name":63,"tactic":315},{"name":65},{"id":71,"name":72,"tactic":317},{"name":74},{"id":85,"name":86,"tactic":319},{"name":79},{"id":94,"name":95,"tactic":321},{"name":92},{"id":323,"name":324,"tactic":325},"D3-SCF","System Call Filtering",{"name":101},{"id":103,"name":104,"tactic":327},{"name":101},{"id":107,"name":108,"tactic":329},{"name":101},{"id":111,"name":112,"tactic":331},{"name":101},{"id":98,"name":99,"tactic":333},{"name":101},{"id":115,"name":116,"tactic":335},{"name":101},{"id":337,"name":338,"tactic":339},"D3-NTF","Network Traffic Filtering",{"name":101},{"id":119,"name":120,"tactic":341},{"name":101},{"id":123,"name":124,"tactic":343},{"name":101},{"id":345,"name":346,"tactic":347},"D3-HBPI","Hardware-based Process Isolation",{"name":101},{"id":349,"name":350,"techniques":351},"CAPEC-293","Traceroute Route Enumeration",[],{"id":353,"name":354,"techniques":355},"CAPEC-294","ICMP Address Mask Request",[],{"id":357,"name":358,"techniques":359},"CAPEC-295","Timestamp Request",[360],{"id":361,"name":362,"tactics":363,"countermeasures":365},"T1124","System Time Discovery",[364],{"id":217,"name":218},[366,368,370,372,374,376],{"id":269,"name":270,"tactic":367},{"name":48},{"id":311,"name":312,"tactic":369},{"name":48},{"id":323,"name":324,"tactic":371},{"name":101},{"id":119,"name":120,"tactic":373},{"name":101},{"id":123,"name":124,"tactic":375},{"name":101},{"id":345,"name":346,"tactic":377},{"name":101},{"id":379,"name":380,"techniques":381},"CAPEC-296","ICMP Information Request",[],{"id":383,"name":384,"techniques":385},"CAPEC-297","TCP ACK Ping",[],{"id":387,"name":388,"techniques":389},"CAPEC-298","UDP Ping",[],{"id":391,"name":392,"techniques":393},"CAPEC-299","TCP SYN Ping",[],{"id":395,"name":396,"techniques":397},"CAPEC-300","Port Scanning",[398],{"id":399,"name":400,"tactics":401,"countermeasures":403},"T1046","Network Service Discovery",[402],{"id":217,"name":218},[],{"id":405,"name":406,"techniques":407},"CAPEC-301","TCP Connect Scan",[],{"id":409,"name":410,"techniques":411},"CAPEC-302","TCP FIN Scan",[],{"id":413,"name":414,"techniques":415},"CAPEC-303","TCP Xmas Scan",[],{"id":417,"name":418,"techniques":419},"CAPEC-304","TCP Null Scan",[],{"id":421,"name":422,"techniques":423},"CAPEC-305","TCP ACK Scan",[],{"id":425,"name":426,"techniques":427},"CAPEC-306","TCP Window Scan",[],{"id":429,"name":430,"techniques":431},"CAPEC-307","TCP RPC Scan",[],{"id":433,"name":434,"techniques":435},"CAPEC-308","UDP Scan",[],{"id":437,"name":438,"techniques":439},"CAPEC-309","Network Topology Mapping",[440,484,494],{"id":441,"name":442,"tactics":443,"countermeasures":445},"T1016","System Network Configuration Discovery",[444],{"id":217,"name":218},[446,448,450,452,454,456,458,460,462,464,466,468,470,472,474,476,478,480,482],{"id":45,"name":46,"tactic":447},{"name":48},{"id":50,"name":51,"tactic":449},{"name":48},{"id":54,"name":55,"tactic":451},{"name":48},{"id":58,"name":59,"tactic":453},{"name":48},{"id":269,"name":270,"tactic":455},{"name":48},{"id":311,"name":312,"tactic":457},{"name":48},{"id":62,"name":63,"tactic":459},{"name":65},{"id":71,"name":72,"tactic":461},{"name":74},{"id":85,"name":86,"tactic":463},{"name":79},{"id":94,"name":95,"tactic":465},{"name":92},{"id":103,"name":104,"tactic":467},{"name":101},{"id":107,"name":108,"tactic":469},{"name":101},{"id":111,"name":112,"tactic":471},{"name":101},{"id":98,"name":99,"tactic":473},{"name":101},{"id":115,"name":116,"tactic":475},{"name":101},{"id":119,"name":120,"tactic":477},{"name":101},{"id":123,"name":124,"tactic":479},{"name":101},{"id":323,"name":324,"tactic":481},{"name":101},{"id":345,"name":346,"tactic":483},{"name":101},{"id":485,"name":486,"tactics":487,"countermeasures":489},"T1049","System Network Connections Discovery",[488],{"id":217,"name":218},[490,492],{"id":269,"name":270,"tactic":491},{"name":48},{"id":323,"name":324,"tactic":493},{"name":101},{"id":495,"name":496,"tactics":497,"countermeasures":499},"T1590","Gather Victim Network Information",[498],{"id":225,"name":226},[],{"id":501,"name":502,"techniques":503},"CAPEC-310","Scanning for Vulnerable Software",[],{"id":505,"name":506,"techniques":507},"CAPEC-312","Active OS Fingerprinting",[508],{"id":509,"name":510,"tactics":511,"countermeasures":513},"T1082","System Information Discovery",[512],{"id":217,"name":218},[514,516,518,522,524,526,528],{"id":269,"name":270,"tactic":515},{"name":48},{"id":311,"name":312,"tactic":517},{"name":48},{"id":519,"name":520,"tactic":521},"D3-DE","Decoy Environment",{"name":74},{"id":323,"name":324,"tactic":523},{"name":101},{"id":119,"name":120,"tactic":525},{"name":101},{"id":123,"name":124,"tactic":527},{"name":101},{"id":345,"name":346,"tactic":529},{"name":101},{"id":531,"name":532,"techniques":533},"CAPEC-313","Passive OS Fingerprinting",[534],{"id":509,"name":510,"tactics":535,"countermeasures":537},[536],{"id":217,"name":218},[538,540,542,544,546,548,550],{"id":269,"name":270,"tactic":539},{"name":48},{"id":311,"name":312,"tactic":541},{"name":48},{"id":519,"name":520,"tactic":543},{"name":74},{"id":323,"name":324,"tactic":545},{"name":101},{"id":119,"name":120,"tactic":547},{"name":101},{"id":123,"name":124,"tactic":549},{"name":101},{"id":345,"name":346,"tactic":551},{"name":101},{"id":553,"name":554,"techniques":555},"CAPEC-317","IP ID Sequencing Probe",[],{"id":557,"name":558,"techniques":559},"CAPEC-318","IP 'ID' Echoed Byte-Order Probe",[],{"id":561,"name":562,"techniques":563},"CAPEC-319","IP (DF) 'Don't Fragment Bit' Echoing Probe",[],{"id":565,"name":566,"techniques":567},"CAPEC-320","TCP Timestamp Probe",[],{"id":569,"name":570,"techniques":571},"CAPEC-321","TCP Sequence Number Probe",[],{"id":573,"name":574,"techniques":575},"CAPEC-322","TCP (ISN) Greatest Common Divisor Probe",[],{"id":577,"name":578,"techniques":579},"CAPEC-323","TCP (ISN) Counter Rate Probe",[],{"id":581,"name":582,"techniques":583},"CAPEC-324","TCP (ISN) Sequence Predictability Probe",[],{"id":585,"name":586,"techniques":587},"CAPEC-325","TCP Congestion Control Flag (ECN) Probe",[],{"id":589,"name":590,"techniques":591},"CAPEC-326","TCP Initial Window Size Probe",[],{"id":593,"name":594,"techniques":595},"CAPEC-327","TCP Options Probe",[],{"id":597,"name":598,"techniques":599},"CAPEC-328","TCP 'RST' Flag Checksum Probe",[],{"id":601,"name":602,"techniques":603},"CAPEC-329","ICMP Error Message Quoting Probe",[],{"id":605,"name":606,"techniques":607},"CAPEC-330","ICMP Error Message Echoing Integrity Probe",[],{"id":609,"name":610,"techniques":611},"CAPEC-472","Browser Fingerprinting",[],{"id":613,"name":614,"techniques":615},"CAPEC-497","File Discovery",[616],{"id":617,"name":618,"tactics":619,"countermeasures":621},"T1083","File and Directory Discovery",[620],{"id":217,"name":218},[622,624,626,628,630,632,634,636,638,640,642],{"id":45,"name":46,"tactic":623},{"name":48},{"id":50,"name":51,"tactic":625},{"name":48},{"id":62,"name":63,"tactic":627},{"name":65},{"id":71,"name":72,"tactic":629},{"name":74},{"id":85,"name":86,"tactic":631},{"name":79},{"id":94,"name":95,"tactic":633},{"name":92},{"id":107,"name":108,"tactic":635},{"name":101},{"id":103,"name":104,"tactic":637},{"name":101},{"id":111,"name":112,"tactic":639},{"name":101},{"id":98,"name":99,"tactic":641},{"name":101},{"id":115,"name":116,"tactic":643},{"name":101},{"id":645,"name":646,"techniques":647},"CAPEC-508","Shoulder Surfing",[],{"id":649,"name":650,"techniques":651},"CAPEC-573","Process Footprinting",[652],{"id":653,"name":654,"tactics":655,"countermeasures":657},"T1057","Process Discovery",[656],{"id":217,"name":218},[658,660,662,664,666,668],{"id":269,"name":270,"tactic":659},{"name":48},{"id":311,"name":312,"tactic":661},{"name":48},{"id":323,"name":324,"tactic":663},{"name":101},{"id":119,"name":120,"tactic":665},{"name":101},{"id":123,"name":124,"tactic":667},{"name":101},{"id":345,"name":346,"tactic":669},{"name":101},{"id":671,"name":672,"techniques":673},"CAPEC-574","Services Footprinting",[674],{"id":675,"name":676,"tactics":677,"countermeasures":679},"T1007","System Service Discovery",[678],{"id":217,"name":218},[680,682,684,686,688,690],{"id":269,"name":270,"tactic":681},{"name":48},{"id":311,"name":312,"tactic":683},{"name":48},{"id":323,"name":324,"tactic":685},{"name":101},{"id":119,"name":120,"tactic":687},{"name":101},{"id":123,"name":124,"tactic":689},{"name":101},{"id":345,"name":346,"tactic":691},{"name":101},{"id":693,"name":694,"techniques":695},"CAPEC-575","Account Footprinting",[696],{"id":697,"name":698,"tactics":699,"countermeasures":701},"T1087","Account Discovery",[700],{"id":217,"name":218},[702,706,710,714,718,722,726,730,734],{"id":703,"name":704,"tactic":705},"D3-AM","Access Modeling",{"name":43},{"id":707,"name":708,"tactic":709},"D3-LAM","Local Account Monitoring",{"name":48},{"id":711,"name":712,"tactic":713},"D3-DAM","Domain Account Monitoring",{"name":48},{"id":715,"name":716,"tactic":717},"D3-AL","Account Locking",{"name":65},{"id":719,"name":720,"tactic":721},"D3-AA","Agent Authentication",{"name":79},{"id":723,"name":724,"tactic":725},"D3-CDP","Change Default Password",{"name":79},{"id":727,"name":728,"tactic":729},"D3-ULA","Unlock Account",{"name":92},{"id":731,"name":732,"tactic":733},"D3-RUAA","Restore User Account Access",{"name":92},{"id":735,"name":736,"tactic":737},"D3-UAP","User Account Permissions",{"name":101},{"id":739,"name":740,"techniques":741},"CAPEC-576","Group Permission Footprinting",[742,748],{"id":743,"name":744,"tactics":745,"countermeasures":747},"T1069","Permission Groups Discovery",[746],{"id":217,"name":218},[],{"id":749,"name":750,"tactics":751,"countermeasures":753},"T1615","Group Policy Discovery",[752],{"id":217,"name":218},[754,756,760,762],{"id":40,"name":41,"tactic":755},{"name":43},{"id":757,"name":758,"tactic":759},"D3-NTPM","Network Traffic Policy Mapping",{"name":43},{"id":703,"name":704,"tactic":761},{"name":43},{"id":89,"name":90,"tactic":763},{"name":92},{"id":765,"name":766,"techniques":767},"CAPEC-577","Owner Footprinting",[768],{"id":769,"name":770,"tactics":771,"countermeasures":773},"T1033","System Owner/User Discovery",[772],{"id":217,"name":218},[774,778,780,782,784,788,792,794,796,800,804,808,812,814,816,820,824,826,830,832,834,836,838,840,842,846,848,852,856,860,862],{"id":775,"name":776,"tactic":777},"D3-DI","Data Inventory",{"name":43},{"id":45,"name":46,"tactic":779},{"name":48},{"id":50,"name":51,"tactic":781},{"name":48},{"id":269,"name":270,"tactic":783},{"name":48},{"id":785,"name":786,"tactic":787},"D3-PLA","Process Lineage Analysis",{"name":48},{"id":789,"name":790,"tactic":791},"D3-PSMD","Process Self-Modification Detection",{"name":48},{"id":311,"name":312,"tactic":793},{"name":48},{"id":62,"name":63,"tactic":795},{"name":65},{"id":797,"name":798,"tactic":799},"D3-PT","Process Termination",{"name":65},{"id":801,"name":802,"tactic":803},"D3-PS","Process Suspension",{"name":65},{"id":805,"name":806,"tactic":807},"D3-HR","Host Reboot",{"name":65},{"id":809,"name":810,"tactic":811},"D3-HS","Host Shutdown",{"name":65},{"id":71,"name":72,"tactic":813},{"name":74},{"id":85,"name":86,"tactic":815},{"name":79},{"id":817,"name":818,"tactic":819},"D3-PSEP","Process Segment Execution Prevention",{"name":79},{"id":821,"name":822,"tactic":823},"D3-SAOR","Segment Address Offset Randomization",{"name":79},{"id":94,"name":95,"tactic":825},{"name":92},{"id":827,"name":828,"tactic":829},"D3-RD","Restore Database",{"name":92},{"id":103,"name":104,"tactic":831},{"name":101},{"id":107,"name":108,"tactic":833},{"name":101},{"id":111,"name":112,"tactic":835},{"name":101},{"id":98,"name":99,"tactic":837},{"name":101},{"id":115,"name":116,"tactic":839},{"name":101},{"id":323,"name":324,"tactic":841},{"name":101},{"id":843,"name":844,"tactic":845},"D3-KBPI","Kernel-based Process Isolation",{"name":101},{"id":345,"name":346,"tactic":847},{"name":101},{"id":849,"name":850,"tactic":851},"D3-ABPI","Application-based Process Isolation",{"name":101},{"id":853,"name":854,"tactic":855},"D3-WSAM","Web Session Access Mediation",{"name":101},{"id":857,"name":858,"tactic":859},"D3-DTP","Domain Trust Policy",{"name":101},{"id":119,"name":120,"tactic":861},{"name":101},{"id":123,"name":124,"tactic":863},{"name":101},{"id":865,"name":866,"techniques":867},"CAPEC-59","Session Credential Falsification through Prediction",[],{"id":869,"name":870,"techniques":871},"CAPEC-60","Reusing Session IDs (aka Session Replay)",[872,924],{"id":873,"name":874,"tactics":875,"countermeasures":879},"T1134.001","Token Impersonation/Theft",[876,877,878],{"id":33,"name":34},{"id":36,"name":37},{"id":134,"name":135},[880,884,888,892,896,900,904,908,912,916,920],{"id":881,"name":882,"tactic":883},"D3-CCSA","Credential Compromise Scope Analysis",{"name":48},{"id":885,"name":886,"tactic":887},"D3-CR","Credential Revocation",{"name":65},{"id":889,"name":890,"tactic":891},"D3-ANCI","Authentication Cache Invalidation",{"name":65},{"id":893,"name":894,"tactic":895},"D3-DUC","Decoy User Credential",{"name":74},{"id":897,"name":898,"tactic":899},"D3-CH","Credential Hardening",{"name":79},{"id":901,"name":902,"tactic":903},"D3-MFA","Multi-factor Authentication",{"name":79},{"id":905,"name":906,"tactic":907},"D3-CRO","Credential Rotation",{"name":79},{"id":909,"name":910,"tactic":911},"D3-TB","Token Binding",{"name":79},{"id":913,"name":914,"tactic":915},"D3-TBA","Token-based Authentication",{"name":79},{"id":917,"name":918,"tactic":919},"D3-RIC","Reissue Credential",{"name":92},{"id":921,"name":922,"tactic":923},"D3-CTS","Credential Transmission Scoping",{"name":101},{"id":925,"name":926,"tactics":927,"countermeasures":932},"T1550.004","Web Session Cookie",[928,929],{"id":33,"name":34},{"id":930,"name":931},"TA0109","Lateral Movement",[933,935,937,939,941,943,945,947,949,951,953,955,957,959,961,963,965,967,969,971,973,975,977,979,981,983,985,987,989,991],{"id":279,"name":280,"tactic":934},{"name":48},{"id":283,"name":284,"tactic":936},{"name":48},{"id":287,"name":288,"tactic":938},{"name":48},{"id":291,"name":292,"tactic":940},{"name":48},{"id":295,"name":296,"tactic":942},{"name":48},{"id":299,"name":300,"tactic":944},{"name":48},{"id":303,"name":304,"tactic":946},{"name":48},{"id":307,"name":308,"tactic":948},{"name":48},{"id":785,"name":786,"tactic":950},{"name":48},{"id":789,"name":790,"tactic":952},{"name":48},{"id":311,"name":312,"tactic":954},{"name":48},{"id":881,"name":882,"tactic":956},{"name":48},{"id":797,"name":798,"tactic":958},{"name":65},{"id":801,"name":802,"tactic":960},{"name":65},{"id":805,"name":806,"tactic":962},{"name":65},{"id":809,"name":810,"tactic":964},{"name":65},{"id":885,"name":886,"tactic":966},{"name":65},{"id":889,"name":890,"tactic":968},{"name":65},{"id":893,"name":894,"tactic":970},{"name":74},{"id":897,"name":898,"tactic":972},{"name":79},{"id":901,"name":902,"tactic":974},{"name":79},{"id":905,"name":906,"tactic":976},{"name":79},{"id":917,"name":918,"tactic":978},{"name":92},{"id":337,"name":338,"tactic":980},{"name":101},{"id":843,"name":844,"tactic":982},{"name":101},{"id":323,"name":324,"tactic":984},{"name":101},{"id":345,"name":346,"tactic":986},{"name":101},{"id":849,"name":850,"tactic":988},{"name":101},{"id":853,"name":854,"tactic":990},{"name":101},{"id":921,"name":922,"tactic":992},{"name":101},{"id":994,"name":995,"techniques":996},"CAPEC-616","Establish Rogue Location",[997],{"id":998,"name":999,"tactics":1000,"countermeasures":1003},"T1036.005","Match Legitimate Resource Name or Location",[1001,1002],{"id":33,"name":34},{"id":36,"name":37},[1004,1006,1008,1010,1012,1014,1016,1018,1020,1022,1024,1026,1028],{"id":269,"name":270,"tactic":1005},{"name":48},{"id":45,"name":46,"tactic":1007},{"name":48},{"id":50,"name":51,"tactic":1009},{"name":48},{"id":62,"name":63,"tactic":1011},{"name":65},{"id":71,"name":72,"tactic":1013},{"name":74},{"id":85,"name":86,"tactic":1015},{"name":79},{"id":94,"name":95,"tactic":1017},{"name":92},{"id":323,"name":324,"tactic":1019},{"name":101},{"id":103,"name":104,"tactic":1021},{"name":101},{"id":107,"name":108,"tactic":1023},{"name":101},{"id":111,"name":112,"tactic":1025},{"name":101},{"id":98,"name":99,"tactic":1027},{"name":101},{"id":115,"name":116,"tactic":1029},{"name":101},{"id":1031,"name":1032,"techniques":1033},"CAPEC-643","Identify Shared Files/Directories on System",[1034],{"id":1035,"name":1036,"tactics":1037,"countermeasures":1039},"T1135","Network Share Discovery",[1038],{"id":217,"name":218},[],{"id":1041,"name":1042,"techniques":1043},"CAPEC-646","Peripheral Footprinting",[1044],{"id":1045,"name":1046,"tactics":1047,"countermeasures":1049},"T1120","Peripheral Device Discovery",[1048],{"id":217,"name":218},[],{"id":1051,"name":1052,"techniques":1053},"CAPEC-651","Eavesdropping",[1054],{"id":1055,"name":1056,"tactics":1057,"countermeasures":1061},"T1111","Multi-Factor Authentication Interception",[1058],{"id":1059,"name":1060},"TA0031","Credential Access",[1062,1066],{"id":1063,"name":1064,"tactic":1065},"D3-HCI","Hardware Component Inventory",{"name":43},{"id":1067,"name":1068,"tactic":1069},"D3-RH","Radiation Hardening",{"name":79},{"id":1071,"name":1072,"techniques":1073},"CAPEC-79","Using Slashes in Alternate Encoding",[],[],[],[],[1078,1080,1082,1084,1086,1088,1090],{"_key":1079},"OPENSUSE-SU-2024:0328-1",{"_key":1081},"OPENSUSE-SU-2024:14243-1",{"_key":1083},"DSA-5743-1",{"_key":1085},"DSA-5743-2",{"_key":1087},"UBUNTU-CVE-2024-42010",{"_key":1089},"MGASA-2024-0279",{"_key":1091},"DEBIAN-CVE-2024-42010",[],[1094,1095,1096],{"_key":1079},{"_key":1081},{"_key":1089},"2024-08-05T00:00:00.000Z","2024-08-12T13:42:04.196Z","Deferred",{"cisa_kev":1101,"cisa_ransomware":1101,"cisa_vendor":9,"epss_severity":1102,"epss_score":1103,"severity":1104,"severity_score":1105,"severity_version":1106,"severity_source":1107,"severity_vector":1108,"severity_status":1099},false,"medium",0.14764,"high",7.5,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",[1110,1115,1119,1123,1127],{"url":1111,"sources":1112,"tags":1114},"https://github.com/roundcube/roundcubemail/releases",[1107,1113],"nvd",[],{"url":1116,"sources":1117,"tags":1118},"https://sonarsource.com/blog/government-emails-at-risk-critical-cross-site-scripting-vulnerability-in-roundcube-webmail/",[1107,1113],[],{"url":1120,"sources":1121,"tags":1122},"https://github.com/roundcube/roundcubemail/releases/tag/1.5.8",[1107,1113],[],{"url":1124,"sources":1125,"tags":1126},"https://github.com/roundcube/roundcubemail/releases/tag/1.6.8",[1107,1113],[],{"url":1128,"sources":1129,"tags":1130},"https://roundcube.net/news/2024/08/04/security-updates-1.6.8-and-1.5.8",[1107,1113],[],[],{"date":1133,"score":1103,"percentile":1134},"2026-04-28",0.94516,[1136,1140,1142,1145,1148,1151,1153,1155,1158,1161,1164,1167,1170,1173,1176,1180,1183,1186,1190,1193,1196,1199,1202,1205,1207,1210,1213,1216,1219,1222,1225,1228,1231,1234,1236,1239,1242,1245,1248,1252,1254,1257,1260,1263,1266,1269,1272,1275,1278,1280,1282,1285,1289,1292,1295,1298,1300,1302,1305,1308,1311,1314,1316,1319,1321,1325,1328,1331,1333,1336,1339,1341,1344,1347,1350,1353,1356,1358,1360,1362,1365,1368,1371,1374,1377,1379,1382,1385,1388,1391],{"date":1137,"score":1138,"percentile":1139},"2025-11-04",0.13011,0.93773,{"date":1141,"score":1138,"percentile":1139},"2025-11-05",{"date":1143,"score":1138,"percentile":1144},"2025-11-06",0.93776,{"date":1146,"score":1138,"percentile":1147},"2025-11-07",0.9378,{"date":1149,"score":1138,"percentile":1150},"2025-11-08",0.93781,{"date":1152,"score":1138,"percentile":1147},"2025-11-09",{"date":1154,"score":1138,"percentile":1150},"2025-11-10",{"date":1156,"score":1138,"percentile":1157},"2025-11-11",0.93783,{"date":1159,"score":1138,"percentile":1160},"2025-11-12",0.93789,{"date":1162,"score":1138,"percentile":1163},"2025-11-13",0.9379,{"date":1165,"score":1138,"percentile":1166},"2025-11-14",0.93794,{"date":1168,"score":1138,"percentile":1169},"2025-11-15",0.93791,{"date":1171,"score":1138,"percentile":1172},"2025-11-16",0.93795,{"date":1174,"score":1138,"percentile":1175},"2025-11-17",0.93793,{"date":1177,"score":1178,"percentile":1179},"2025-11-18",0.00826,0.72383,{"date":1181,"score":1178,"percentile":1182},"2025-11-19",0.72391,{"date":1184,"score":1178,"percentile":1185},"2025-11-20",0.724,{"date":1187,"score":1188,"percentile":1189},"2025-11-21",0.10665,0.92999,{"date":1191,"score":1188,"percentile":1192},"2025-11-22",0.92998,{"date":1194,"score":1188,"percentile":1195},"2025-11-23",0.93001,{"date":1197,"score":1188,"percentile":1198},"2025-11-24",0.93002,{"date":1200,"score":1188,"percentile":1201},"2025-11-25",0.93004,{"date":1203,"score":1188,"percentile":1204},"2025-11-26",0.93003,{"date":1206,"score":1188,"percentile":1198},"2025-11-27",{"date":1208,"score":1188,"percentile":1209},"2025-11-28",0.92996,{"date":1211,"score":1188,"percentile":1212},"2025-11-29",0.9301,{"date":1214,"score":1188,"percentile":1215},"2025-11-30",0.93011,{"date":1217,"score":1188,"percentile":1218},"2025-12-01",0.93059,{"date":1220,"score":1188,"percentile":1221},"2025-12-02",0.93064,{"date":1223,"score":1188,"percentile":1224},"2025-12-03",0.93067,{"date":1226,"score":1188,"percentile":1227},"2025-12-04",0.9302,{"date":1229,"score":1188,"percentile":1230},"2025-12-05",0.93023,{"date":1232,"score":1188,"percentile":1233},"2025-12-06",0.93025,{"date":1235,"score":1188,"percentile":1230},"2025-12-07",{"date":1237,"score":1188,"percentile":1238},"2025-12-08",0.93027,{"date":1240,"score":1188,"percentile":1241},"2025-12-09",0.93029,{"date":1243,"score":1188,"percentile":1244},"2025-12-10",0.93036,{"date":1246,"score":1188,"percentile":1247},"2025-12-11",0.93039,{"date":1249,"score":1250,"percentile":1251},"2025-12-12",0.1527,0.9437,{"date":1253,"score":1250,"percentile":1251},"2025-12-13",{"date":1255,"score":1250,"percentile":1256},"2025-12-14",0.94368,{"date":1258,"score":1250,"percentile":1259},"2025-12-15",0.94372,{"date":1261,"score":1250,"percentile":1262},"2025-12-16",0.94374,{"date":1264,"score":1250,"percentile":1265},"2025-12-17",0.94376,{"date":1267,"score":1250,"percentile":1268},"2025-12-18",0.94379,{"date":1270,"score":1250,"percentile":1271},"2025-12-19",0.94381,{"date":1273,"score":1250,"percentile":1274},"2025-12-20",0.94382,{"date":1276,"score":1250,"percentile":1277},"2025-12-21",0.94387,{"date":1279,"score":1250,"percentile":1277},"2025-12-22",{"date":1281,"score":1250,"percentile":1277},"2025-12-23",{"date":1283,"score":1250,"percentile":1284},"2025-12-24",0.94391,{"date":1286,"score":1287,"percentile":1288},"2025-12-25",0.18053,0.94948,{"date":1290,"score":1287,"percentile":1291},"2025-12-26",0.94949,{"date":1293,"score":1287,"percentile":1294},"2025-12-27",0.94974,{"date":1296,"score":1287,"percentile":1297},"2025-12-28",0.94945,{"date":1299,"score":1287,"percentile":1297},"2025-12-29",{"date":1301,"score":1287,"percentile":1288},"2025-12-30",{"date":1303,"score":1287,"percentile":1304},"2025-12-31",0.94952,{"date":1306,"score":1287,"percentile":1307},"2026-01-01",0.94995,{"date":1309,"score":1287,"percentile":1310},"2026-01-02",0.9499,{"date":1312,"score":1287,"percentile":1313},"2026-01-03",0.94986,{"date":1315,"score":1287,"percentile":1297},"2026-01-04",{"date":1317,"score":1287,"percentile":1318},"2026-01-05",0.94943,{"date":1320,"score":1287,"percentile":1318},"2026-01-06",{"date":1322,"score":1323,"percentile":1324},"2026-01-07",0.17254,0.94804,{"date":1326,"score":1323,"percentile":1327},"2026-01-08",0.9481,{"date":1329,"score":1323,"percentile":1330},"2026-01-09",0.94811,{"date":1332,"score":1323,"percentile":1330},"2026-01-10",{"date":1334,"score":1323,"percentile":1335},"2026-01-11",0.94809,{"date":1337,"score":1323,"percentile":1338},"2026-01-12",0.94808,{"date":1340,"score":1323,"percentile":1338},"2026-01-13",{"date":1342,"score":1323,"percentile":1343},"2026-01-14",0.94812,{"date":1345,"score":1323,"percentile":1346},"2026-01-15",0.94813,{"date":1348,"score":1323,"percentile":1349},"2026-01-16",0.94815,{"date":1351,"score":1323,"percentile":1352},"2026-01-17",0.94818,{"date":1354,"score":1323,"percentile":1355},"2026-01-18",0.94817,{"date":1357,"score":1323,"percentile":1346},"2026-01-19",{"date":1359,"score":1323,"percentile":1355},"2026-01-20",{"date":1361,"score":1323,"percentile":1352},"2026-01-21",{"date":1363,"score":1323,"percentile":1364},"2026-01-22",0.94821,{"date":1366,"score":1323,"percentile":1367},"2026-01-23",0.94826,{"date":1369,"score":1323,"percentile":1370},"2026-01-24",0.9483,{"date":1372,"score":1323,"percentile":1373},"2026-01-25",0.94833,{"date":1375,"score":1323,"percentile":1376},"2026-01-26",0.94834,{"date":1378,"score":1323,"percentile":1376},"2026-01-27",{"date":1380,"score":1323,"percentile":1381},"2026-01-28",0.94836,{"date":1383,"score":1323,"percentile":1384},"2026-01-29",0.94839,{"date":1386,"score":1323,"percentile":1387},"2026-01-30",0.9484,{"date":1389,"score":1323,"percentile":1390},"2026-01-31",0.94841,{"date":1392,"score":1323,"percentile":1393},"2026-02-01",0.94877,[1395,1400],{"source":1107,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":1396,"cvss_v4_0":9},{"baseScore":1105,"baseSeverity":1397,"vectorString":1108,"impactScore":1398,"exploitabilityScore":1399},"HIGH",6,10,{"source":1113,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":1401,"cvss_v4_0":9},{"baseScore":1105,"baseSeverity":1397,"vectorString":1108,"impactScore":1398,"exploitabilityScore":1399},[]]