2022-09-26 07:40:11 +02:00
|
|
|
{
|
|
|
|
"attributes": {
|
|
|
|
"0day-today-id": {
|
|
|
|
"description": "Reference to the 0day.today referencing this exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 0
|
|
|
|
},
|
|
|
|
"accessibility": {
|
|
|
|
"description": "Accessibility of the exploit.",
|
|
|
|
"disable_correlation": true,
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 0,
|
|
|
|
"values_list": [
|
|
|
|
"Unknown",
|
|
|
|
"Public",
|
|
|
|
"Limited",
|
|
|
|
"Paid"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"comment": {
|
|
|
|
"description": "Comment associated to the exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 1
|
|
|
|
},
|
|
|
|
"credit": {
|
|
|
|
"description": "Credit(s) for the exploit (such as author, distributor or original source).",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 0
|
|
|
|
},
|
|
|
|
"cve-id": {
|
|
|
|
"description": "Reference to the CVE value targeted by the exploit.",
|
|
|
|
"misp-attribute": "vulnerability",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 0
|
|
|
|
},
|
2022-10-23 23:11:48 +02:00
|
|
|
"description": {
|
|
|
|
"description": "Description of the exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 1
|
|
|
|
},
|
2022-09-26 07:40:11 +02:00
|
|
|
"exploit": {
|
|
|
|
"description": "Free text of the exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 10
|
|
|
|
},
|
|
|
|
"exploit-as-attachment": {
|
|
|
|
"description": "Attachment of the exploit.",
|
|
|
|
"misp-attribute": "attachment",
|
|
|
|
"ui-priority": 10
|
|
|
|
},
|
|
|
|
"exploitdb-id": {
|
|
|
|
"description": "Reference to the ExploitDB referencing this exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 0
|
|
|
|
},
|
|
|
|
"filename": {
|
|
|
|
"description": "Filename used for the exploit.",
|
|
|
|
"disable_correlation": true,
|
|
|
|
"misp-attribute": "filename",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 8
|
|
|
|
},
|
|
|
|
"level": {
|
|
|
|
"description": "Level of the exploit.",
|
|
|
|
"disable_correlation": true,
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 0,
|
|
|
|
"values_list": [
|
|
|
|
"Unknown",
|
|
|
|
"Proof-of-Concept",
|
|
|
|
"Functional",
|
|
|
|
"Production-ready"
|
|
|
|
]
|
|
|
|
},
|
|
|
|
"reference": {
|
|
|
|
"description": "Reference to the exploit.",
|
|
|
|
"disable_correlation": true,
|
|
|
|
"misp-attribute": "link",
|
|
|
|
"multiple": true,
|
|
|
|
"ui-priority": 0
|
2022-10-23 23:11:48 +02:00
|
|
|
},
|
2024-03-18 15:19:35 +01:00
|
|
|
"software": {
|
|
|
|
"description": "Software impacted",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 10
|
|
|
|
},
|
2022-10-23 23:11:48 +02:00
|
|
|
"title": {
|
|
|
|
"description": "Title of the exploit.",
|
|
|
|
"misp-attribute": "text",
|
|
|
|
"ui-priority": 1
|
2022-09-26 07:40:11 +02:00
|
|
|
}
|
|
|
|
},
|
|
|
|
"description": "Exploit object describes a program in binary or source code form used to abuse one or more vulnerabilities.",
|
|
|
|
"meta-category": "misc",
|
|
|
|
"name": "exploit",
|
|
|
|
"requiredOneOf": [
|
|
|
|
"exploit",
|
|
|
|
"filename",
|
|
|
|
"exploit-as-attachment"
|
|
|
|
],
|
|
|
|
"uuid": "611a25d5-d8aa-4dde-b9c8-c084e786ebf3",
|
|
|
|
"version": 1
|
|
|
|
}
|