{"type": "bundle", "id": "bundle--815e8c10-c6d7-4898-8579-b904d6829541", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "objects": [{"type": "vulnerability", "id": "vulnerability--e83fbf5f-4409-4111-9bda-0d3e901ed766", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-40044", "description": "Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40044", "source_name": "cve", "external_id": "CVE-2023-40044"}]}, {"type": "relationship", "id": "relationship--2a25ae9a-9f41-4d09-b771-b10d79b45d08", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e83fbf5f-4409-4111-9bda-0d3e901ed766", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--8fb5d2bf-253a-4034-aaa1-19cec2c22f07", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e83fbf5f-4409-4111-9bda-0d3e901ed766", "target_ref": "attack-pattern--9a60a291-8960-4387-8a4a-2ab5c18bb50b"}, {"type": "vulnerability", "id": "vulnerability--652f559d-e9b1-4081-b20c-8d1493b827e9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-36804", "description": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36804", "source_name": "cve", "external_id": "CVE-2022-36804"}]}, {"type": "relationship", "id": "relationship--fdc9b524-5c66-41b3-a206-db3b7b6e6da5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--652f559d-e9b1-4081-b20c-8d1493b827e9", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--6ad4cc76-e797-4e34-bb43-305304dd815d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-26085", "description": "Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26085", "source_name": "cve", "external_id": "CVE-2021-26085"}]}, {"type": "relationship", "id": "relationship--794959bb-3e40-4943-a6fa-80c2793aacbf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6ad4cc76-e797-4e34-bb43-305304dd815d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--dc89e2ef-053e-4991-aaf1-62e7e6aaf532", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-3043", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3043", "source_name": "cve", "external_id": "CVE-2015-3043"}]}, {"type": "relationship", "id": "relationship--108846b8-bd36-483e-bd7f-0732dda33dad", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--dc89e2ef-053e-4991-aaf1-62e7e6aaf532", "target_ref": "attack-pattern--2bee5ffb-7a7a-4119-b1f2-158151b19ac0"}, {"type": "relationship", "id": "relationship--6f4e5e72-becc-4e62-81fc-151ee3edd6e7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--dc89e2ef-053e-4991-aaf1-62e7e6aaf532", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--8444ec7b-7f1d-484e-9bd6-1c75ae547b24", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-26369", "description": "Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26369", "source_name": "cve", "external_id": "CVE-2023-26369"}]}, {"type": "relationship", "id": "relationship--0f0927d2-cd63-496e-bbac-efa304e24ee7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8444ec7b-7f1d-484e-9bd6-1c75ae547b24", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--e2e9c42d-57a9-4901-9539-735a9062664c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2014-0546", "description": "Adobe Acrobat and Reader Sandbox Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0546", "source_name": "cve", "external_id": "CVE-2014-0546"}]}, {"type": "relationship", "id": "relationship--49170ab8-2b08-48db-a60a-66dcd0f8e227", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e2e9c42d-57a9-4901-9539-735a9062664c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--5b218726-b9c5-480b-af8f-c83d47b90de4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2010-2883", "description": "Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", "source_name": "cve", "external_id": "CVE-2010-2883"}]}, {"type": "relationship", "id": "relationship--fa34a24a-7924-4ce0-83d5-364e58de2fd1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5b218726-b9c5-480b-af8f-c83d47b90de4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6bc26e98-3a4b-42be-909b-a3ec9017e210", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5b218726-b9c5-480b-af8f-c83d47b90de4", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "vulnerability", "id": "vulnerability--2bc4cce9-df47-4a60-8c83-364e6dd6498b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-21608", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21608", "source_name": "cve", "external_id": "CVE-2023-21608"}]}, {"type": "relationship", "id": "relationship--4c758588-5245-4301-8af5-d54d801fd39b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2bc4cce9-df47-4a60-8c83-364e6dd6498b", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--536f51bb-0736-4029-bae2-fb09028f23cf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-26359", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26359", "source_name": "cve", "external_id": "CVE-2023-26359"}]}, {"type": "relationship", "id": "relationship--53cbfe1d-6fb9-4f58-a663-cd8861386e9d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--536f51bb-0736-4029-bae2-fb09028f23cf", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--3af596f1-5ddf-4d15-bd0b-7af739e135b4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0629", "description": "Adobe ColdFusion Directory Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0629", "source_name": "cve", "external_id": "CVE-2013-0629"}]}, {"type": "relationship", "id": "relationship--f634bb85-1436-44eb-aa0c-794959bc5146", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3af596f1-5ddf-4d15-bd0b-7af739e135b4", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--8b57fff1-880e-43a7-9cbc-d5fad8e0ea45", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3af596f1-5ddf-4d15-bd0b-7af739e135b4", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "vulnerability", "id": "vulnerability--2f042a92-7f37-4840-b937-9ede2deb9057", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-24086", "description": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24086", "source_name": "cve", "external_id": "CVE-2022-24086"}]}, {"type": "relationship", "id": "relationship--a090d6b3-4450-45fa-93a2-f75b16097f58", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2f042a92-7f37-4840-b937-9ede2deb9057", "target_ref": "attack-pattern--d28ef391-8ed4-45dc-bc4a-2f43abf54416"}, {"type": "relationship", "id": "relationship--176cd6c7-0753-4593-9563-3ab3c4426fb4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2f042a92-7f37-4840-b937-9ede2deb9057", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "vulnerability", "id": "vulnerability--ba61acc7-8983-4caa-a73a-10337c59ee79", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2014-7169", "description": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "source_name": "cve", "external_id": "CVE-2014-7169"}]}, {"type": "relationship", "id": "relationship--4c27ac29-8283-496b-b1bc-a83c60e51955", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ba61acc7-8983-4caa-a73a-10337c59ee79", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--a6ac560e-42c1-48d3-8fa9-867309988868", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ba61acc7-8983-4caa-a73a-10337c59ee79", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--e9acfb8f-0ebf-4674-956e-e5548b754c38", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ba61acc7-8983-4caa-a73a-10337c59ee79", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--91ad7b12-0c0d-4e7a-90fd-e48402cd1dc4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2014-6271", "description": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", "source_name": "cve", "external_id": "CVE-2014-6271"}]}, {"type": "relationship", "id": "relationship--360e2f95-058a-4fd6-ab3f-1fae2f776573", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--91ad7b12-0c0d-4e7a-90fd-e48402cd1dc4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--2960caa1-c84e-4221-97db-d4b26a029d6a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--91ad7b12-0c0d-4e7a-90fd-e48402cd1dc4", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--dd0b3745-1ac7-4363-a0be-da9d26921d3d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--91ad7b12-0c0d-4e7a-90fd-e48402cd1dc4", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--cd97cbdb-18be-44c7-a56f-85a8c6012fe9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21206", "description": "Google Chromium Blink Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21206", "source_name": "cve", "external_id": "CVE-2021-21206"}]}, {"type": "relationship", "id": "relationship--17001d6e-ecb9-475e-a262-2d829863610d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cd97cbdb-18be-44c7-a56f-85a8c6012fe9", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--b8cf9ef2-6477-42ec-8aac-3c598cf7fced", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cd97cbdb-18be-44c7-a56f-85a8c6012fe9", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--f3ff570e-7d28-45b2-8d40-78aa96b03c85", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-30554", "description": "Google Chromium WebGL Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30554", "source_name": "cve", "external_id": "CVE-2021-30554"}]}, {"type": "relationship", "id": "relationship--cdd6b4f1-f853-4cd0-aad9-1beb15524495", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3ff570e-7d28-45b2-8d40-78aa96b03c85", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--2de83935-b34b-440b-ae47-3627fb69dae3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3ff570e-7d28-45b2-8d40-78aa96b03c85", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--af64bca4-ac8c-4271-a3c1-18699493fcec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-37975", "description": "Google Chromium V8 Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975", "source_name": "cve", "external_id": "CVE-2021-37975"}]}, {"type": "relationship", "id": "relationship--c59b306f-7070-4ab7-84e2-ac26092a3150", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--af64bca4-ac8c-4271-a3c1-18699493fcec", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--52469657-b978-4797-a57f-2bf926faac46", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--af64bca4-ac8c-4271-a3c1-18699493fcec", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--3070316e-5a3f-4d5a-a1b5-9237f2474d2c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21148", "description": "Google Chromium V8 Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21148", "source_name": "cve", "external_id": "CVE-2021-21148"}]}, {"type": "relationship", "id": "relationship--a41283e1-3efc-4b21-9c65-8fcd42a03135", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3070316e-5a3f-4d5a-a1b5-9237f2474d2c", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--01c682c6-3446-4717-bafd-234cea179f82", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3070316e-5a3f-4d5a-a1b5-9237f2474d2c", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--a5df5375-3b24-411f-b18a-ac706f81a1a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21166", "description": "Google Chromium Race Condition Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21166", "source_name": "cve", "external_id": "CVE-2021-21166"}]}, {"type": "relationship", "id": "relationship--87c0aa5b-195c-426d-a267-9e8dd884a4d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a5df5375-3b24-411f-b18a-ac706f81a1a3", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--a599fe97-66ec-4091-8665-c780dff64059", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a5df5375-3b24-411f-b18a-ac706f81a1a3", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--b3faee33-ed46-4d88-8173-99ba726159b5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-38080", "description": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38080", "source_name": "cve", "external_id": "CVE-2024-38080"}]}, {"type": "relationship", "id": "relationship--d1472cd2-905b-41a8-985e-63372313cdde", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b3faee33-ed46-4d88-8173-99ba726159b5", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--5ff83bb7-beb1-4aaa-975d-d53f7328a892", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-47966", "description": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47966", "source_name": "cve", "external_id": "CVE-2022-47966"}]}, {"type": "relationship", "id": "relationship--9447deb1-c211-42fe-bf6c-0178077714aa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5ff83bb7-beb1-4aaa-975d-d53f7328a892", "target_ref": "attack-pattern--635cbe30-392d-4e27-978e-66774357c762"}, {"type": "relationship", "id": "relationship--b5d9bddf-3608-498c-b2b2-77f024f18a63", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5ff83bb7-beb1-4aaa-975d-d53f7328a892", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--a61bff87-cbc3-43a0-8cf3-906e009d16f5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-29256", "description": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29256", "source_name": "cve", "external_id": "CVE-2021-29256"}]}, {"type": "relationship", "id": "relationship--af74470c-77f1-44a8-a50c-777fc919d0e5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a61bff87-cbc3-43a0-8cf3-906e009d16f5", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--dd768475-3689-44a1-9647-e20e0ab001c0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a61bff87-cbc3-43a0-8cf3-906e009d16f5", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--9ab31c7f-0268-4373-bc35-cf905db091f0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-5274", "description": "Google Chromium V8 Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5274", "source_name": "cve", "external_id": "CVE-2024-5274"}]}, {"type": "relationship", "id": "relationship--79087fd4-7952-40b7-aaad-6f0293083814", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9ab31c7f-0268-4373-bc35-cf905db091f0", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--aa0f6c81-6e03-4f4f-a7d3-bfa9443a1069", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-0688", "description": "Microsoft Exchange Server Validation Key Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0688", "source_name": "cve", "external_id": "CVE-2020-0688"}]}, {"type": "relationship", "id": "relationship--0d4b974d-5274-4c69-975d-1868544eadae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--aa0f6c81-6e03-4f4f-a7d3-bfa9443a1069", "target_ref": "attack-pattern--1608f3e1-598a-42f4-a01a-2e252e81728f"}, {"type": "relationship", "id": "relationship--f6a93b2e-b0a3-4deb-ab20-ae3f548ab58f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--aa0f6c81-6e03-4f4f-a7d3-bfa9443a1069", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-1472", "description": "Microsoft Netlogon Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472", "source_name": "cve", "external_id": "CVE-2020-1472"}]}, {"type": "relationship", "id": "relationship--b66e8ca5-91e4-43a0-8bdc-cdf73a3a279b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--ed9cb6d1-9cf4-43c1-84f8-bd8752a526ae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21972", "description": "VMware vCenter Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21972", "source_name": "cve", "external_id": "CVE-2021-21972"}]}, {"type": "relationship", "id": "relationship--146e85af-9af1-409d-9ff0-bc490f6a7d1e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ed9cb6d1-9cf4-43c1-84f8-bd8752a526ae", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2290c9b6-b162-41a5-9f08-a39bed57b8f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ed9cb6d1-9cf4-43c1-84f8-bd8752a526ae", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--3b823ba7-1158-4db7-bfc1-cc16443e6a40", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27065", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27065", "source_name": "cve", "external_id": "CVE-2021-27065"}]}, {"type": "relationship", "id": "relationship--13b24dd6-ca9e-4cc8-8891-f8d6ac56938e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3b823ba7-1158-4db7-bfc1-cc16443e6a40", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--e6de674a-4118-4b2f-92f2-d99a177fe522", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3b823ba7-1158-4db7-bfc1-cc16443e6a40", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--0218600e-ba7e-4a96-9789-49ec3348d5d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-26858", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26858", "source_name": "cve", "external_id": "CVE-2021-26858"}]}, {"type": "relationship", "id": "relationship--8e1d5de1-e772-4475-8d77-c6805a1e4c11", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0218600e-ba7e-4a96-9789-49ec3348d5d0", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--30e8515d-2778-447b-a6c2-79cd9573e6b1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0218600e-ba7e-4a96-9789-49ec3348d5d0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b3a5382c-7331-45fd-9cc9-2405157339fd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-26857", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26857", "source_name": "cve", "external_id": "CVE-2021-26857"}]}, {"type": "relationship", "id": "relationship--df030625-3d9f-4f17-b9a2-3aba023a82a8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b3a5382c-7331-45fd-9cc9-2405157339fd", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--87e06235-a679-4e57-a56e-47e485070a7e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b3a5382c-7331-45fd-9cc9-2405157339fd", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--cf23f6e0-6651-4736-a615-3a0fe1d5c2bb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-26855", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26855", "source_name": "cve", "external_id": "CVE-2021-26855"}]}, {"type": "relationship", "id": "relationship--392e45e9-5894-4f2d-8848-768d54428738", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cf23f6e0-6651-4736-a615-3a0fe1d5c2bb", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--b43d4ca2-7691-4c39-bf91-f7595608d3b5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cf23f6e0-6651-4736-a615-3a0fe1d5c2bb", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--185008e2-4ea3-4cee-a481-27382d66ddfa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cf23f6e0-6651-4736-a615-3a0fe1d5c2bb", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "relationship", "id": "relationship--b68cb54e-3bd4-4931-adbf-63d9357125ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cf23f6e0-6651-4736-a615-3a0fe1d5c2bb", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-34473", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34473", "source_name": "cve", "external_id": "CVE-2021-34473"}]}, {"type": "relationship", "id": "relationship--84d26351-d3e4-4abb-bcd4-ac5d5b5293c5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--ad678898-ee31-4f66-a146-3a9308b37389", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "target_ref": "attack-pattern--fb8d023d-45be-47e9-bc51-f56bcae6435b"}, {"type": "relationship", "id": "relationship--529d4fc1-d1a2-40e0-a1ef-1b7d262144f3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--4afd7638-7e29-43d5-8a63-078351bb16f7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "target_ref": "attack-pattern--005a06c6-14bf-4118-afa0-ebcd8aebb0c9"}, {"type": "relationship", "id": "relationship--3452d26f-ea96-4882-b5d5-ca5dd26886d7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5d83942e-f843-4428-97c2-7a5a0ab4ffc2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--bbe766bc-7707-4de8-b974-1dd59b88e46a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-34523", "description": "Microsoft Exchange Server Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34523", "source_name": "cve", "external_id": "CVE-2021-34523"}]}, {"type": "relationship", "id": "relationship--3e1aa329-2a81-4651-8684-5fc3e22993d2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bbe766bc-7707-4de8-b974-1dd59b88e46a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-40539", "description": "Zoho ManageEngine ADSelfService Plus Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40539", "source_name": "cve", "external_id": "CVE-2021-40539"}]}, {"type": "relationship", "id": "relationship--03953ac8-c984-4103-8e01-ff61213b2491", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--45acbf26-c7f8-4087-8875-9e4f2509b736", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--00f90846-cbd1-4fc5-9233-df5c2bf2a662"}, {"type": "relationship", "id": "relationship--39ee7547-5ffb-418d-86ad-676b1b8f8f0e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--f4dcb5b2-1827-4dd8-8471-e645f78ab6ab", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--c196dfd7-3890-4487-b502-1e7b8afef2f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--01a5a209-b94c-450b-b7f9-946497d91055"}, {"type": "relationship", "id": "relationship--e7ba158a-7061-427d-9661-9c3846ce687c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--9e4e4c56-bf29-4d82-a0cb-499ac41dc115", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--cbc201aa-5064-4e95-9b44-f82bc591ee46", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--457c7820-d331-465a-915e-42f85500ccc4"}, {"type": "relationship", "id": "relationship--adb4ccb0-d291-4ef1-bc36-b9fbe0d1914e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--93d02585-231d-49ff-89eb-7925d61b5eea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--3ccef7ae-cb5e-48f6-8302-897105fbf55c"}, {"type": "relationship", "id": "relationship--864bbb44-9b6a-4f4f-9097-a8aed127cd1b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--55e5d096-53b1-49f3-acf3-8a3628da34d3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--efa200cb-051d-42f0-8c7e-3b1d81098233", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-44228", "description": "Apache Log4j2 Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228", "source_name": "cve", "external_id": "CVE-2021-44228"}]}, {"type": "relationship", "id": "relationship--9b7a69fb-5ebc-4af4-b089-d58b6b799dd5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--457b6302-9965-4279-bf6e-2ba76cc20df0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--6ace38f2-8261-4f7b-8779-eb76520fdcaa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--2604b855-66c2-4fe2-ac2b-f516f2824836", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--f5b46f57-7029-4923-8573-4a5b9482c0ba", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f02d694d-ed07-4e12-812a-694b054fad08", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--fe59e5cb-a982-4893-ae54-5af6240faaa7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--aa0f6c81-6e03-4f4f-a7d3-bfa9443a1069", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--ce8b75b1-ee8c-4fca-9182-fdc1c5927200", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--aa0f6c81-6e03-4f4f-a7d3-bfa9443a1069", "target_ref": "attack-pattern--a93494bb-4b80-4ea1-8695-3236a49916fd"}, {"type": "relationship", "id": "relationship--5691cb24-6af4-47d6-b6c7-afb0805f486b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--994a01ec-4de4-4a06-a27f-223839f3592c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "relationship", "id": "relationship--f2a0e837-5872-4f07-9c80-667e162541a9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--a93494bb-4b80-4ea1-8695-3236a49916fd"}, {"type": "vulnerability", "id": "vulnerability--1455e655-5a51-4480-9c36-1333b3480c1d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-0787", "description": "Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0787", "source_name": "cve", "external_id": "CVE-2020-0787"}]}, {"type": "relationship", "id": "relationship--8ce0ea83-00d9-4f7c-a920-0900dfde501b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1455e655-5a51-4480-9c36-1333b3480c1d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--1e8e8a1c-a188-4700-b9b3-7c0d8c2455a7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1455e655-5a51-4480-9c36-1333b3480c1d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-0604", "description": "Microsoft SharePoint Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0604", "source_name": "cve", "external_id": "CVE-2019-0604"}]}, {"type": "relationship", "id": "relationship--66255d1b-e07c-4614-a344-f0d2e5233b84", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--c4153621-fc35-4a5c-901f-fb4af85af5a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--2365ba4c-339d-453f-a504-ff152863c89f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--721f3d0f-bee8-4599-8c52-77648c3fc6da", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--43a9dcda-1fc8-470c-a2f5-520dba152193", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a4233edd-5c93-4051-9239-3c89b57c5f0c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--9dddc642-c282-4954-9729-6a5eca92ec37", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-18935", "description": "Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18935", "source_name": "cve", "external_id": "CVE-2019-18935"}]}, {"type": "relationship", "id": "relationship--6954e70c-7934-44c9-a632-4b09acd7811c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9dddc642-c282-4954-9729-6a5eca92ec37", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--a290aa68-e298-4f12-b424-3de210ab7463", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9dddc642-c282-4954-9729-6a5eca92ec37", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--962430c5-6e75-49bc-87ec-9e30626415bc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9dddc642-c282-4954-9729-6a5eca92ec37", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--4be0f94d-fdce-48e2-a1f7-98fe15bebcf9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9dddc642-c282-4954-9729-6a5eca92ec37", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--032563f4-6c1c-404c-a05e-8d547249499c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-11882", "description": "Microsoft Office Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882", "source_name": "cve", "external_id": "CVE-2017-11882"}]}, {"type": "relationship", "id": "relationship--69643876-b358-4ffa-8400-e7df2f70b5a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--032563f4-6c1c-404c-a05e-8d547249499c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--62eb2ebb-fb17-4fb6-a583-2e65df614065", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--032563f4-6c1c-404c-a05e-8d547249499c", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--e8ea0e0a-eb75-4d09-bea5-fe96bff8b564", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-15505", "description": "Ivanti MobileIron Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15505", "source_name": "cve", "external_id": "CVE-2020-15505"}]}, {"type": "relationship", "id": "relationship--5a297927-e908-4457-a421-6669643fb3aa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e8ea0e0a-eb75-4d09-bea5-fe96bff8b564", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--07f809b2-ff14-4d04-affc-2b655892dd67", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e8ea0e0a-eb75-4d09-bea5-fe96bff8b564", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-5902", "description": "F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5902", "source_name": "cve", "external_id": "CVE-2020-5902"}]}, {"type": "relationship", "id": "relationship--8438792d-4b15-4e15-9e75-6f05dbb22d3c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--575e626c-bb37-4ea3-b6b5-2f662ceed0c1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--ac08589e-ee59-4935-8667-d845e38fe579"}, {"type": "relationship", "id": "relationship--c01e1000-9f4f-41ad-b47d-04da8ae80564", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--13962203-1363-4b7a-a39e-a76b3b27cccb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e2f65ea6-0425-4e4a-af2c-cdf30f13714a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--96390734-9107-492c-b038-99d31b1db444", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-11510", "description": "Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11510", "source_name": "cve", "external_id": "CVE-2019-11510"}]}, {"type": "relationship", "id": "relationship--b45c2dc1-b164-42b0-8760-0a38dc50ba48", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--96390734-9107-492c-b038-99d31b1db444", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--e61234db-e67c-4083-b163-90919d81a391", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--96390734-9107-492c-b038-99d31b1db444", "target_ref": "attack-pattern--837f9164-50af-4ac0-8219-379d8a74cefc"}, {"type": "relationship", "id": "relationship--30d42e86-34ad-47cc-aa6e-f0e8db042361", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--96390734-9107-492c-b038-99d31b1db444", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--65762ee0-e48a-479e-b464-32702a9f8322", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--96390734-9107-492c-b038-99d31b1db444", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--0d717904-c6b4-43e2-8405-667e53006b7d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-19781", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781", "source_name": "cve", "external_id": "CVE-2019-19781"}]}, {"type": "relationship", "id": "relationship--14639d93-2729-437b-a88d-8bbffd85bf32", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0d717904-c6b4-43e2-8405-667e53006b7d", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--b4e7a1ff-f114-48ad-be71-21e643e0847e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0d717904-c6b4-43e2-8405-667e53006b7d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c871f053-96e4-4ce2-8d6a-5885d4f309de", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0d717904-c6b4-43e2-8405-667e53006b7d", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--96cc78aa-3740-4166-b0d3-045e63c67cf8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b7d52b58-440a-46e6-9925-48ac50269e91", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--11a4207c-a266-470a-9e13-21a18d8114bd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-13379", "description": "Fortinet FortiOS SSL VPN Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13379", "source_name": "cve", "external_id": "CVE-2018-13379"}]}, {"type": "relationship", "id": "relationship--866db325-fae8-4e13-85e7-10b9b0e52af8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--11a4207c-a266-470a-9e13-21a18d8114bd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--c0562c5f-4d89-4913-b461-fa1ff4a07da7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-1388", "description": "F5 BIG-IP Missing Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1388", "source_name": "cve", "external_id": "CVE-2022-1388"}]}, {"type": "relationship", "id": "relationship--9ac51682-d5d6-4f1d-b524-8ae8d7d36657", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c0562c5f-4d89-4913-b461-fa1ff4a07da7", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "vulnerability", "id": "vulnerability--d6bdce49-2c9f-4065-9246-c1702c83cb9a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-0313", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0313", "source_name": "cve", "external_id": "CVE-2015-0313"}]}, {"type": "relationship", "id": "relationship--2817ca1b-6818-4a06-90d4-e64f034825ed", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d6bdce49-2c9f-4065-9246-c1702c83cb9a", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--8745fdeb-e203-463a-8da3-a821e3ddf490", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-31207", "description": "Microsoft Exchange Server Security Feature Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31207", "source_name": "cve", "external_id": "CVE-2021-31207"}]}, {"type": "relationship", "id": "relationship--07a3ec7f-0d4c-42ce-8f0f-9a9fb94501e5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8745fdeb-e203-463a-8da3-a821e3ddf490", "target_ref": "attack-pattern--ac9e6b22-11bf-45d7-9181-c1cb08360931"}, {"type": "vulnerability", "id": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-5119", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5119", "source_name": "cve", "external_id": "CVE-2015-5119"}]}, {"type": "relationship", "id": "relationship--ef9a4a30-e0c9-467c-bd1b-8e0392ee9780", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--384ba785-347f-420d-be77-fbcef3ce56ee", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--f4599aa0-4f85-4a32-80ea-fc39dc965945"}, {"type": "relationship", "id": "relationship--aef2d5cf-301e-4de6-8675-f8204d2577fa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--3badd4da-97c6-41e5-b871-b9d31d1e95fd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--d1c334ea-b90d-48d1-b28d-2a51614aaa01", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "relationship", "id": "relationship--0f48dac3-8519-4834-b864-7a20c75bf438", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--36d83233-8319-40d7-9199-01547a8b9d48", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--610349be-8e44-4bb9-9e49-bfbefc747b4a", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "relationship", "id": "relationship--75ee2eb5-915b-4c2b-bd4d-ebaacca5ccb0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8745fdeb-e203-463a-8da3-a821e3ddf490", "target_ref": "attack-pattern--120d5519-3098-4e1c-9191-2aa61232f073"}, {"type": "vulnerability", "id": "vulnerability--24b70746-e1aa-4a18-9d25-9cd23557a86d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22954", "description": "VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22954", "source_name": "cve", "external_id": "CVE-2022-22954"}]}, {"type": "relationship", "id": "relationship--d3ec6d11-ccfd-4d75-a5e6-6be30d72388f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--24b70746-e1aa-4a18-9d25-9cd23557a86d", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--f6ab481f-565c-43a5-92be-153bea4c3c29", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22960", "description": "VMware Multiple Products Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22960", "source_name": "cve", "external_id": "CVE-2022-22960"}]}, {"type": "relationship", "id": "relationship--1a92863f-ff1e-4c79-b5b8-b8a2aa88669e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f6ab481f-565c-43a5-92be-153bea4c3c29", "target_ref": "attack-pattern--65917ae0-b854-4139-83fe-bf2441cf0196"}, {"type": "relationship", "id": "relationship--286d895a-1205-48a0-9e85-e42c61b25c75", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9ab31c7f-0268-4373-bc35-cf905db091f0", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--c38a968b-bd66-43b9-beb8-f2bfedcf265c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--24b70746-e1aa-4a18-9d25-9cd23557a86d", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "vulnerability", "id": "vulnerability--df0480dc-cf42-4f29-a9b9-43161b0bb3e9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2012-0767", "description": "Adobe Flash Player Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", "source_name": "cve", "external_id": "CVE-2012-0767"}]}, {"type": "relationship", "id": "relationship--a894b546-9000-4d89-b0af-c5328f0e8ecb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--df0480dc-cf42-4f29-a9b9-43161b0bb3e9", "target_ref": "attack-pattern--b4694861-542c-48ea-9eb1-10d356e7140a"}, {"type": "relationship", "id": "relationship--54bb05f7-457e-44f7-89aa-ffebdf6ab8d4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--df0480dc-cf42-4f29-a9b9-43161b0bb3e9", "target_ref": "attack-pattern--a10641f4-87b4-45a3-a906-92a149cb2c27"}, {"type": "relationship", "id": "relationship--32febd46-4c40-4081-b15b-6e33ac2eaf0b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--df0480dc-cf42-4f29-a9b9-43161b0bb3e9", "target_ref": "attack-pattern--544b0346-29ad-41e1-a808-501bb4193f47"}, {"type": "vulnerability", "id": "vulnerability--7c41a261-36f6-4876-8a4a-f3b06eed78d3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-1653", "description": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1653", "source_name": "cve", "external_id": "CVE-2019-1653"}]}, {"type": "relationship", "id": "relationship--ae8beeba-f108-4548-b5fe-88f7accf0dc6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7c41a261-36f6-4876-8a4a-f3b06eed78d3", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-26360", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26360", "source_name": "cve", "external_id": "CVE-2023-26360"}]}, {"type": "relationship", "id": "relationship--3c40d9b3-ad05-4e73-ac9b-503a3542f79f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--367d8512-2f4e-49e7-9b71-70d2735f37eb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--c245616d-f6c8-48a8-bed6-56c7256629f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--2f9f925b-6511-4d83-9aa9-0062a07e8902", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--65f2d882-3f41-4d48-8a06-29af77ec9f90"}, {"type": "relationship", "id": "relationship--4d5099ba-adda-433a-adbd-bd1aedd21248", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2"}, {"type": "relationship", "id": "relationship--c75bb770-cbb8-43b8-a8df-3dd193db0aa4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--5d2be8b9-d24c-4e98-83bf-2f5f79477163"}, {"type": "relationship", "id": "relationship--7e15df0c-d382-4e63-a457-d98b5549be5e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--87814d34-6e57-4f41-954e-0261fb42b24c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--cb64eb44-d44b-4fe5-bdda-fc5a3fab952e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-4437", "description": "Apache Shiro Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", "source_name": "cve", "external_id": "CVE-2016-4437"}]}, {"type": "relationship", "id": "relationship--76ef74a6-27e4-417d-b6a9-7dc5fbed5367", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cb64eb44-d44b-4fe5-bdda-fc5a3fab952e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c7df1d93-e788-48e5-b3a2-b4853ef8bcd2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cb64eb44-d44b-4fe5-bdda-fc5a3fab952e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--f1e41972-edab-48c6-8c65-5f25e69bc7ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-42013", "description": "Apache HTTP Server Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42013", "source_name": "cve", "external_id": "CVE-2021-42013"}]}, {"type": "relationship", "id": "relationship--10997a18-140b-4086-811c-b4c8cacf2b54", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f1e41972-edab-48c6-8c65-5f25e69bc7ec", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "relationship", "id": "relationship--14e193e4-f939-40e2-9540-6b1304cdbaa9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f1e41972-edab-48c6-8c65-5f25e69bc7ec", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a4d050cc-025d-4648-8ce6-26b17ce9c66a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-41773", "description": "Apache HTTP Server Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41773", "source_name": "cve", "external_id": "CVE-2021-41773"}]}, {"type": "relationship", "id": "relationship--f3f9dd2e-383f-4dc2-b821-ec63542657e5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a4d050cc-025d-4648-8ce6-26b17ce9c66a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--179c0c8a-5dcd-4797-9ea7-01f2309f6216", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a4d050cc-025d-4648-8ce6-26b17ce9c66a", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "vulnerability", "id": "vulnerability--0a207b8d-c081-4873-bd13-9d30626e9ed7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-0069", "description": "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0069", "source_name": "cve", "external_id": "CVE-2020-0069"}]}, {"type": "relationship", "id": "relationship--bf98ab93-dd05-45ce-8cea-441b9f371fac", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0a207b8d-c081-4873-bd13-9d30626e9ed7", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--69c1d320-e4ad-43ce-917f-1017279fbd08", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-5735", "description": "Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5735", "source_name": "cve", "external_id": "CVE-2020-5735"}]}, {"type": "relationship", "id": "relationship--655aee5a-e839-44de-879a-1f0f1702a85c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--69c1d320-e4ad-43ce-917f-1017279fbd08", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--0dccbce4-9a42-4e99-b341-82f7c97aaa37", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--69c1d320-e4ad-43ce-917f-1017279fbd08", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--55771f1d-487f-4e71-84f2-05e6c777ce86", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7c41a261-36f6-4876-8a4a-f3b06eed78d3", "target_ref": "attack-pattern--322bad5a-1c49-4d23-ab79-76d641794afa"}, {"type": "relationship", "id": "relationship--10142c0d-59e3-4ccb-960c-bc0faf53c315", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7c41a261-36f6-4876-8a4a-f3b06eed78d3", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--17ab2e70-c079-448a-8d86-8902b8e86993", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7c41a261-36f6-4876-8a4a-f3b06eed78d3", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--bbc3fa6c-1568-4ff8-a76d-e4e7eb828c10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--abd9db2d-acfd-496b-ba78-56c4d4a9750a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--58274889-9892-444d-9754-9ef290ea5d29", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0625", "description": "Adobe ColdFusion Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0625", "source_name": "cve", "external_id": "CVE-2013-0625"}]}, {"type": "relationship", "id": "relationship--9b7c453d-d583-45d2-b582-668a6079487f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--58274889-9892-444d-9754-9ef290ea5d29", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--d951deb5-e76e-4337-865c-a68523b02272", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0632", "description": "Adobe ColdFusion Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0632", "source_name": "cve", "external_id": "CVE-2013-0632"}]}, {"type": "relationship", "id": "relationship--b7c40864-0e3e-4af2-9da1-16f5abb6a985", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d951deb5-e76e-4337-865c-a68523b02272", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1280b80c-af66-4139-a567-c66577fda6e1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2009-3960", "description": "Adobe BlazeDS Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", "source_name": "cve", "external_id": "CVE-2009-3960"}]}, {"type": "relationship", "id": "relationship--2f4b0827-c5db-4dca-9937-801c3a361d31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1280b80c-af66-4139-a567-c66577fda6e1", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--1de06902-f5d0-4013-866b-506030da8f1d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1280b80c-af66-4139-a567-c66577fda6e1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f5210171-a96b-405f-bfc5-2ebca431abbe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--df0480dc-cf42-4f29-a9b9-43161b0bb3e9", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--1e7d1f87-0d6c-4e86-a12d-094889a3ff81", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-1019", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1019", "source_name": "cve", "external_id": "CVE-2016-1019"}]}, {"type": "relationship", "id": "relationship--359f6fa3-1b99-4737-85d0-93936e67f752", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1e7d1f87-0d6c-4e86-a12d-094889a3ff81", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--34bcb7da-5b0e-4b3d-83f8-c71479b89bee", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1e7d1f87-0d6c-4e86-a12d-094889a3ff81", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--85720173-fb38-4ca8-85fa-2a629b2cda45", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1e7d1f87-0d6c-4e86-a12d-094889a3ff81", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--0b0558ce-9259-4b62-a065-bb413e86d5a1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a61bff87-cbc3-43a0-8cf3-906e009d16f5", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--33fadd4f-afbf-4a79-9bda-73ebe896e173", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b3faee33-ed46-4d88-8173-99ba726159b5", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--d1c154b9-1c77-4e0e-8580-00204e4946f2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5ff83bb7-beb1-4aaa-975d-d53f7328a892", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--5b7d6520-550e-4f2e-9f18-37059b0e88d3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-11776", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11776", "source_name": "cve", "external_id": "CVE-2018-11776"}]}, {"type": "relationship", "id": "relationship--682500a8-7dc0-45f9-8fac-d7ae6d58fc05", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5b7d6520-550e-4f2e-9f18-37059b0e88d3", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--c08becc5-0b57-4137-889d-b5ab885c72e2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5b7d6520-550e-4f2e-9f18-37059b0e88d3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cdd8dc5b-30ec-468e-aea2-8ecf1292995b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5b7d6520-550e-4f2e-9f18-37059b0e88d3", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b773aec5-01d1-470a-9d19-e4ea5d1a4f86", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-5638", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5638", "source_name": "cve", "external_id": "CVE-2017-5638"}]}, {"type": "relationship", "id": "relationship--366fcf2b-0e6a-424a-8a67-968580d3b1c8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b773aec5-01d1-470a-9d19-e4ea5d1a4f86", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--a5c04e3d-252d-4004-811b-1be0168aff20", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b773aec5-01d1-470a-9d19-e4ea5d1a4f86", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2ea81cfd-6e17-4358-a886-c82a8be17960", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b773aec5-01d1-470a-9d19-e4ea5d1a4f86", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--96932995-e4d2-4c21-9a60-390022880e52", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-17530", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530", "source_name": "cve", "external_id": "CVE-2020-17530"}]}, {"type": "relationship", "id": "relationship--9e702fca-d027-445c-b489-a8612424b51e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--96932995-e4d2-4c21-9a60-390022880e52", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f05287f8-8626-49cb-a7af-979e813b0cb8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--96932995-e4d2-4c21-9a60-390022880e52", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f5c6615b-9a17-434a-9eca-049df87aa716", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-17558", "description": "Apache Solr VelocityResponseWriter Plug-In Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17558", "source_name": "cve", "external_id": "CVE-2019-17558"}]}, {"type": "relationship", "id": "relationship--8ea80e1a-b372-48ab-a42b-1bbc1065f41d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f5c6615b-9a17-434a-9eca-049df87aa716", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b2217298-ae6d-4558-bc61-8d8e894a80f7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f5c6615b-9a17-434a-9eca-049df87aa716", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a600ef8e-360e-476f-ba08-9c544c9f6efb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-0211", "description": "Apache HTTP Server Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", "source_name": "cve", "external_id": "CVE-2019-0211"}]}, {"type": "relationship", "id": "relationship--932831bb-2ea4-49c6-9495-a3db0baa1b90", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a600ef8e-360e-476f-ba08-9c544c9f6efb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--f1d6ed4b-7244-4fb2-8a6c-508a0bbdecb7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-9805", "description": "Apache Struts Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9805", "source_name": "cve", "external_id": "CVE-2017-9805"}]}, {"type": "relationship", "id": "relationship--8a82572a-08b6-4536-ad91-cc8cfdb3ed86", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f1d6ed4b-7244-4fb2-8a6c-508a0bbdecb7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--75e3a1a0-129c-4a85-961c-2922e12c37bb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f1d6ed4b-7244-4fb2-8a6c-508a0bbdecb7", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--fa96bca6-3d14-4650-abe3-890252ea86b5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27104", "description": "Accellion FTA OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27104", "source_name": "cve", "external_id": "CVE-2021-27104"}]}, {"type": "relationship", "id": "relationship--3c42acfc-088e-4390-936d-d4f3b88707ae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa96bca6-3d14-4650-abe3-890252ea86b5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--82efc34d-0e93-4e48-b568-57da7930bdf7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa96bca6-3d14-4650-abe3-890252ea86b5", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--f9cc7f34-345e-4d3b-bef5-2135c0112d42", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27101", "description": "Accellion FTA SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27101", "source_name": "cve", "external_id": "CVE-2021-27101"}]}, {"type": "relationship", "id": "relationship--e1491d81-abe3-4ddc-8c80-212d37472b91", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f9cc7f34-345e-4d3b-bef5-2135c0112d42", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--bd89a9dd-be7b-4a77-ab02-72c1d7ff29ff", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27103", "description": "Accellion FTA Server-Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27103", "source_name": "cve", "external_id": "CVE-2021-27103"}]}, {"type": "relationship", "id": "relationship--6e9bf510-8c77-441d-bc63-b44c6161319d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--bd89a9dd-be7b-4a77-ab02-72c1d7ff29ff", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--b8707d4d-a6a5-4e9d-be6d-8d12483bb210", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27102", "description": "Accellion FTA OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27102", "source_name": "cve", "external_id": "CVE-2021-27102"}]}, {"type": "relationship", "id": "relationship--1e429eb9-d0c3-472c-89a1-02c3e54f2b0c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b8707d4d-a6a5-4e9d-be6d-8d12483bb210", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--de286100-4796-4a7d-ad32-479e93d9d939", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b8707d4d-a6a5-4e9d-be6d-8d12483bb210", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--06589ce8-505a-4d0e-beba-8980c2a50f08", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bd89a9dd-be7b-4a77-ab02-72c1d7ff29ff", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d256f14d-6b8a-4ea5-b06d-9638a0b31a4e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b8707d4d-a6a5-4e9d-be6d-8d12483bb210", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--eec25be9-22d1-44cc-a775-c879f8139232", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f9cc7f34-345e-4d3b-bef5-2135c0112d42", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--27956a1a-ad97-4618-a4fd-05fe0a531d71", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fa96bca6-3d14-4650-abe3-890252ea86b5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--54feff9f-a65c-4d8c-aab8-797b6e08fbba", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-4990", "description": "Adobe Acrobat and Reader Double Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4990", "source_name": "cve", "external_id": "CVE-2018-4990"}]}, {"type": "relationship", "id": "relationship--320678d6-b90c-4dd6-b868-1a5e21224f73", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--54feff9f-a65c-4d8c-aab8-797b6e08fbba", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--1b5bb1ad-68cf-44de-bfa4-dc3541be33ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--54feff9f-a65c-4d8c-aab8-797b6e08fbba", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--47baf9d6-e78b-4470-aef0-0d43c9f3d8b1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2007-5659", "description": "Adobe Acrobat and Reader Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", "source_name": "cve", "external_id": "CVE-2007-5659"}]}, {"type": "relationship", "id": "relationship--d94431d9-5054-468e-b256-a687748060ae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--47baf9d6-e78b-4470-aef0-0d43c9f3d8b1", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--349ec94e-a4bc-497a-a863-cea7189a31b0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-4878", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4878", "source_name": "cve", "external_id": "CVE-2018-4878"}]}, {"type": "relationship", "id": "relationship--c2b272f3-1fbb-49a6-8c9c-9503d9320ead", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--349ec94e-a4bc-497a-a863-cea7189a31b0", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--84cfec78-33fc-43d6-96e8-a0ae07bffffe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--349ec94e-a4bc-497a-a863-cea7189a31b0", "target_ref": "attack-pattern--4061e78c-1284-44b4-9116-73e4ac3912f7"}, {"type": "relationship", "id": "relationship--6901d031-2ae2-4035-8729-f602f7fcdb39", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--349ec94e-a4bc-497a-a863-cea7189a31b0", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--11b77434-4444-49e6-9750-7aeab1723672", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-15961", "description": "Adobe ColdFusion Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15961", "source_name": "cve", "external_id": "CVE-2018-15961"}]}, {"type": "relationship", "id": "relationship--f7e0a688-0bef-4549-911f-c70be01d43d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--11b77434-4444-49e6-9750-7aeab1723672", "target_ref": "attack-pattern--0cfe31a7-81fc-472c-bc45-e2808d1066a3"}, {"type": "relationship", "id": "relationship--75ad0362-efa0-4bbe-9bfb-b8520aafa8a9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--11b77434-4444-49e6-9750-7aeab1723672", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--d56d8bfa-bf57-4a3b-95a2-a6f42acaefdc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-4939", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4939", "source_name": "cve", "external_id": "CVE-2018-4939"}]}, {"type": "relationship", "id": "relationship--388c24f2-09e1-4716-b52d-ea958e51bbe7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d56d8bfa-bf57-4a3b-95a2-a6f42acaefdc", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--203e6dab-f933-4697-93bf-27a35560fc3f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d56d8bfa-bf57-4a3b-95a2-a6f42acaefdc", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--548f26a1-11e0-4d53-9166-4fac210f278a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d56d8bfa-bf57-4a3b-95a2-a6f42acaefdc", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--3f7c7220-452e-431c-8757-70742ce6745e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-28550", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28550", "source_name": "cve", "external_id": "CVE-2021-28550"}]}, {"type": "relationship", "id": "relationship--60b9c00d-6071-4f4e-b70a-8e9298010989", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3f7c7220-452e-431c-8757-70742ce6745e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--4f782d31-bcd8-4106-b61e-7369ed1acdcb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21017", "description": "Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21017", "source_name": "cve", "external_id": "CVE-2021-21017"}]}, {"type": "relationship", "id": "relationship--470c4073-8531-480b-b5cc-8a6c9cf54e65", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4f782d31-bcd8-4106-b61e-7369ed1acdcb", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--0433de85-b678-44fb-ad09-2d37b6427401", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-33739", "description": "Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33739", "source_name": "cve", "external_id": "CVE-2021-33739"}]}, {"type": "relationship", "id": "relationship--3629723c-e8b4-49a1-9e9c-ef8a938214b5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0433de85-b678-44fb-ad09-2d37b6427401", "target_ref": "attack-pattern--8982a661-d84c-48c0-b4ec-1db29c6cf3bc"}, {"type": "relationship", "id": "relationship--42a8a1db-0b7e-4ddb-b762-045d8cf6a18b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0433de85-b678-44fb-ad09-2d37b6427401", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22205", "description": "GitLab Community and Enterprise Editions Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22205", "source_name": "cve", "external_id": "CVE-2021-22205"}]}, {"type": "relationship", "id": "relationship--ed365bb0-b20e-4981-a617-0ec5e2d850e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--0fd5d205-8eda-4daf-9a5c-584d6271bc1d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-11634", "description": "Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11634", "source_name": "cve", "external_id": "CVE-2019-11634"}]}, {"type": "relationship", "id": "relationship--f8879cf9-5bd1-4ba9-a475-26f065b186c5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--28e326ab-7812-4eed-ae4d-8717356a0eb8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "vulnerability", "id": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-13608", "description": "Citrix StoreFront Server XML External Entity (XXE) Processing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13608", "source_name": "cve", "external_id": "CVE-2019-13608"}]}, {"type": "relationship", "id": "relationship--032311d5-b027-4501-9c88-985419fbde67", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--8cf4ed85-7677-4f67-b6cd-21511368e737", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--abf7280c-2a0f-4c4c-b092-6a54ec39860f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--9e4b9b0d-f1d4-404f-9f69-0402bbe04a22", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--0bf1335e-41ce-44ec-a31d-e0b6d9de1823", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f925afd8-7071-40a3-be08-cf61733c2a15", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--2194a2d6-2760-48d9-841b-469037b1cc50", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--f6d7597a-f88b-41d5-bc09-5187e6b63909", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--03f3933f-a546-454b-bf4b-b6d7f161d4eb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--fac83c63-d837-41b7-a99f-badb13bc0fb9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-0296", "description": "Cisco Adaptive Security Appliance (ASA) Denial-of-Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0296", "source_name": "cve", "external_id": "CVE-2018-0296"}]}, {"type": "relationship", "id": "relationship--c633f54a-0a11-4862-91bd-b46e19a1e6cd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fac83c63-d837-41b7-a99f-badb13bc0fb9", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--79490dc5-f679-454d-b9aa-be910aeb5915", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fac83c63-d837-41b7-a99f-badb13bc0fb9", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--e380aa94-c7c5-4c45-ba33-b638e3c7c092", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-1498", "description": "Cisco HyperFlex HX Data Platform Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1498", "source_name": "cve", "external_id": "CVE-2021-1498"}]}, {"type": "relationship", "id": "relationship--d17f2a45-f30a-4277-ad95-9db4dcb9cdaa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e380aa94-c7c5-4c45-ba33-b638e3c7c092", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--494cfe16-c100-4aa5-910e-fe59738d412c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e380aa94-c7c5-4c45-ba33-b638e3c7c092", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d4ee25b9-638b-49e9-9c85-0833d1b19c9d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-1497", "description": "Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1497", "source_name": "cve", "external_id": "CVE-2021-1497"}]}, {"type": "relationship", "id": "relationship--e685ed8c-5d80-4566-bb59-7a7bbabc55c4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d4ee25b9-638b-49e9-9c85-0833d1b19c9d", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--355f151f-e771-422a-86d8-251ee33ce427", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d4ee25b9-638b-49e9-9c85-0833d1b19c9d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4afe2e02-0a02-4061-9e66-41a457b198a5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-4117", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4117", "source_name": "cve", "external_id": "CVE-2016-4117"}]}, {"type": "relationship", "id": "relationship--2aa7f903-4f90-408b-9260-6004be2a8b41", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4afe2e02-0a02-4061-9e66-41a457b198a5", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--c1b406d7-ac81-4978-9f9a-40acfd0994ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4afe2e02-0a02-4061-9e66-41a457b198a5", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--345bb27e-c247-4c2c-85d9-42af4720bece", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-0984", "description": "Adobe Flash Player and AIR Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0984", "source_name": "cve", "external_id": "CVE-2016-0984"}]}, {"type": "relationship", "id": "relationship--b4958335-70a2-419d-8cb1-c96306696c85", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--345bb27e-c247-4c2c-85d9-42af4720bece", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--b8c47f96-55a5-418a-9e26-19d9e1a695be", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--345bb27e-c247-4c2c-85d9-42af4720bece", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--272af644-c681-4c04-9af3-e42037d7c5e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-1010", "description": "Adobe Flash Player and AIR Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1010", "source_name": "cve", "external_id": "CVE-2016-1010"}]}, {"type": "relationship", "id": "relationship--d53b0128-a9c5-4449-a555-233693cf9d65", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--272af644-c681-4c04-9af3-e42037d7c5e3", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--03e0e13f-2bb6-435a-9bc3-98652ce049b1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-34102", "description": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34102", "source_name": "cve", "external_id": "CVE-2024-34102"}]}, {"type": "relationship", "id": "relationship--b543d596-7192-4a0b-be24-5cd7ebafaccc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--03e0e13f-2bb6-435a-9bc3-98652ce049b1", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--f2ab301e-8b24-465d-af02-57333e052abe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--03e0e13f-2bb6-435a-9bc3-98652ce049b1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--9ddc6576-3afa-4294-96ba-af957b767e88", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--03e0e13f-2bb6-435a-9bc3-98652ce049b1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--df52f484-eba9-477c-88ef-351fae4d6046", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2f042a92-7f37-4840-b937-9ede2deb9057", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--29646f8d-e23c-4449-907d-8d8a4cd24cd1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0631", "description": "Adobe ColdFusion Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0631", "source_name": "cve", "external_id": "CVE-2013-0631"}]}, {"type": "relationship", "id": "relationship--170d4a9b-de22-49fb-b8c0-4172624415a1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--29646f8d-e23c-4449-907d-8d8a4cd24cd1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--559ffabb-41fa-4ee0-9026-8a2415c356c8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--29646f8d-e23c-4449-907d-8d8a4cd24cd1", "target_ref": "attack-pattern--09312b1a-c3c6-4b45-9844-3ccc78e5d82f"}, {"type": "vulnerability", "id": "vulnerability--9cbc343c-80d2-4ff1-8405-e99e223af1bc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-38205", "description": "Adobe ColdFusion Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38205", "source_name": "cve", "external_id": "CVE-2023-38205"}]}, {"type": "relationship", "id": "relationship--336dc551-2164-4d57-bff7-08cd86653f7f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9cbc343c-80d2-4ff1-8405-e99e223af1bc", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--5207aa59-e42e-4eb3-83bf-3ffffaa5290d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-29298", "description": "Adobe ColdFusion Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29298", "source_name": "cve", "external_id": "CVE-2023-29298"}]}, {"type": "relationship", "id": "relationship--29946b47-b55d-418a-a9ee-272f3425724b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5207aa59-e42e-4eb3-83bf-3ffffaa5290d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--0d722845-f38e-451c-a209-cc17cb161aba", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-3580", "description": "Cisco ASA and FTD Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3580", "source_name": "cve", "external_id": "CVE-2020-3580"}]}, {"type": "relationship", "id": "relationship--ca421a13-c38f-4375-85a9-ae6c57a18e43", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0d722845-f38e-451c-a209-cc17cb161aba", "target_ref": "attack-pattern--5e4a2073-9643-44cb-a0b5-e7f4048446c7"}, {"type": "relationship", "id": "relationship--c1916a23-2b6b-4319-b54e-2051fe8d0833", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0d722845-f38e-451c-a209-cc17cb161aba", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0a9c2e1c-b189-4e02-933a-15977843edf5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0d722845-f38e-451c-a209-cc17cb161aba", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--43253575-c13d-41d1-9d9d-75bb07b19853", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-3452", "description": "Cisco ASA and FTD Read-Only Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3452", "source_name": "cve", "external_id": "CVE-2020-3452"}]}, {"type": "relationship", "id": "relationship--c4af1caa-3c3d-4584-9578-df09ae40d07e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--43253575-c13d-41d1-9d9d-75bb07b19853", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--dd1e0097-4d2b-4d91-bc04-5ad4eb8a6450", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--43253575-c13d-41d1-9d9d-75bb07b19853", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "vulnerability", "id": "vulnerability--97643f11-533f-432d-85ab-a3fe1e91606f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-42258", "description": "BQE BillQuick Web Suite SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42258", "source_name": "cve", "external_id": "CVE-2021-42258"}]}, {"type": "relationship", "id": "relationship--2ecdadfa-ee72-48e3-a83b-e77cd2b50b4a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--97643f11-533f-432d-85ab-a3fe1e91606f", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--e1c0319e-0fde-40cc-a90e-10368bfd4b95", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--97643f11-533f-432d-85ab-a3fe1e91606f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a4ac486b-ece9-4de9-bea8-7197155e0034", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-3396", "description": "Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3396", "source_name": "cve", "external_id": "CVE-2019-3396"}]}, {"type": "relationship", "id": "relationship--58e0aed0-e835-4e82-b594-fcf8fa403d30", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a4ac486b-ece9-4de9-bea8-7197155e0034", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--e5d8c4e6-2faf-412f-9438-ccdb7b82a8ed", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a4ac486b-ece9-4de9-bea8-7197155e0034", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "relationship", "id": "relationship--a83b0fa6-d6d3-4c76-a1b5-b81c720e60d4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a4ac486b-ece9-4de9-bea8-7197155e0034", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--f2929eb3-ab63-459f-8849-8f6cfa3befc5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-11580", "description": "Atlassian Crowd and Crowd Data Center Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11580", "source_name": "cve", "external_id": "CVE-2019-11580"}]}, {"type": "relationship", "id": "relationship--bd7551f0-736c-4e1e-afc5-4f9f23369567", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f2929eb3-ab63-459f-8849-8f6cfa3befc5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--b9f857e8-279b-4cf4-b8e8-532eb475777a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-26084", "description": "Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26084", "source_name": "cve", "external_id": "CVE-2021-26084"}]}, {"type": "relationship", "id": "relationship--5a4b8e06-7f59-42b9-ba79-a9933c774b31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b9f857e8-279b-4cf4-b8e8-532eb475777a", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--2ed9385d-7fc9-4e5a-a391-c666f2fcf62a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b9f857e8-279b-4cf4-b8e8-532eb475777a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--79e29567-1770-4baa-8671-b9a586b63f6f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-3398", "description": "Atlassian Confluence Server and Data Center Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3398", "source_name": "cve", "external_id": "CVE-2019-3398"}]}, {"type": "relationship", "id": "relationship--6cb38785-5e73-43a1-8212-037b4a91b581", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--79e29567-1770-4baa-8671-b9a586b63f6f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--116cf215-50a6-4221-b525-45baafdb892f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--79e29567-1770-4baa-8671-b9a586b63f6f", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "vulnerability", "id": "vulnerability--314a0994-3eb8-45fe-917d-2a69b664a13b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2010-2861", "description": "Adobe ColdFusion Directory Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", "source_name": "cve", "external_id": "CVE-2010-2861"}]}, {"type": "relationship", "id": "relationship--b07dce1a-8844-4774-a99b-02e01463bd7d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--314a0994-3eb8-45fe-917d-2a69b664a13b", "target_ref": "attack-pattern--30208d3e-0d6b-43c8-883e-44462a514619"}, {"type": "relationship", "id": "relationship--a9f614de-51fb-44aa-98f8-6787566dcc33", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--314a0994-3eb8-45fe-917d-2a69b664a13b", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--dc461cd9-55e4-4bce-bcbc-c4f1393c3ac9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--314a0994-3eb8-45fe-917d-2a69b664a13b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--552449a1-e61e-499b-a14f-96e0092a82da", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3af596f1-5ddf-4d15-bd0b-7af739e135b4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--d2183c2e-f002-4d79-b205-ecaff5f69dca", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-38203", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38203", "source_name": "cve", "external_id": "CVE-2023-38203"}]}, {"type": "relationship", "id": "relationship--26fbeafd-5d79-444b-a1da-c4cc99716cdc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d2183c2e-f002-4d79-b205-ecaff5f69dca", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--16abb85b-cfe0-4f81-8cc3-38330349d7b7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d2183c2e-f002-4d79-b205-ecaff5f69dca", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--10b1ccf2-6936-409f-ab3c-7e4ad46a506b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-29300", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29300", "source_name": "cve", "external_id": "CVE-2023-29300"}]}, {"type": "relationship", "id": "relationship--95f2c154-b546-4aef-94f6-ac3510b79a41", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--10b1ccf2-6936-409f-ab3c-7e4ad46a506b", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--5955cc1e-0750-4b4f-a2b9-d6a7c73d5516", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--10b1ccf2-6936-409f-ab3c-7e4ad46a506b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--5b7c915f-05b0-49df-8a91-0e8b64b0fc9f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--536f51bb-0736-4029-bae2-fb09028f23cf", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--4c2e35e4-fe8d-427b-9443-03ef5cd66177", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2009-1862", "description": "Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", "source_name": "cve", "external_id": "CVE-2009-1862"}]}, {"type": "relationship", "id": "relationship--e2185143-e7d1-4302-8854-c363da36b7c2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4c2e35e4-fe8d-427b-9443-03ef5cd66177", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--8c6a4fe5-fc8e-45da-835a-121e18098a8e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2bc4cce9-df47-4a60-8c83-364e6dd6498b", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--37e002aa-a626-4671-8947-a6127de28a84", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2009-4324", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", "source_name": "cve", "external_id": "CVE-2009-4324"}]}, {"type": "relationship", "id": "relationship--3c5b5ba4-8df5-4d4d-9e69-9f64ba509674", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--37e002aa-a626-4671-8947-a6127de28a84", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--2d618760-ce6f-4a15-b116-a6df027fb699", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--37e002aa-a626-4671-8947-a6127de28a84", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "vulnerability", "id": "vulnerability--2671f41c-4ed5-44d1-9136-0f33b8c0cda2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2008-0655", "description": "Adobe Acrobat and Reader Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", "source_name": "cve", "external_id": "CVE-2008-0655"}]}, {"type": "relationship", "id": "relationship--7d227a0b-47a7-4763-a63e-4eb771d3215d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2671f41c-4ed5-44d1-9136-0f33b8c0cda2", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--a9152ae4-834b-4d39-af09-f36ea04099e7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2009-3953", "description": "Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", "source_name": "cve", "external_id": "CVE-2009-3953"}]}, {"type": "relationship", "id": "relationship--d6e82af7-124b-4e1d-9e6e-2765a6fd9244", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a9152ae4-834b-4d39-af09-f36ea04099e7", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--2802bb4a-534b-4bd8-8377-65d268f55a92", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2011-2462", "description": "Adobe Acrobat and Reader Universal 3D Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", "source_name": "cve", "external_id": "CVE-2011-2462"}]}, {"type": "relationship", "id": "relationship--2e364b45-63b2-4242-a89e-314fa0837a69", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2802bb4a-534b-4bd8-8377-65d268f55a92", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--9d335b9a-8017-41a2-84be-3505081e8626", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5b218726-b9c5-480b-af8f-c83d47b90de4", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--c022baad-fe53-49bd-ad37-0a6f8b0795fe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e2e9c42d-57a9-4901-9539-735a9062664c", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "relationship", "id": "relationship--e08d47a4-c505-43ea-b399-cf51da7240a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8444ec7b-7f1d-484e-9bd6-1c75ae547b24", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--5a93580d-f263-43b4-b633-106e33a39084", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26134", "description": "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26134", "source_name": "cve", "external_id": "CVE-2022-26134"}]}, {"type": "relationship", "id": "relationship--dcc5dfaa-9b9f-48ad-a7c3-cef9f0dac58e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5a93580d-f263-43b4-b633-106e33a39084", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--7851d59d-d100-427d-ba90-ab4a7dadb7d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-30190", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30190", "source_name": "cve", "external_id": "CVE-2022-30190"}]}, {"type": "relationship", "id": "relationship--4a69049c-ab97-42ab-a1e5-602b65d8fc79", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7851d59d-d100-427d-ba90-ab4a7dadb7d0", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--2a0b768a-9c3a-4ac5-8ecf-e76d53a52c50", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7851d59d-d100-427d-ba90-ab4a7dadb7d0", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--f802ccb9-2683-4b6e-8681-f1146b3a2fb8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2008-2992", "description": "Adobe Reader and Acrobat Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", "source_name": "cve", "external_id": "CVE-2008-2992"}]}, {"type": "relationship", "id": "relationship--9df4502c-823f-41ff-b8aa-a34299cadd9d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f802ccb9-2683-4b6e-8681-f1146b3a2fb8", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--b3bff993-216c-4ce6-be14-9ae0f1a5ffd6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2010-0188", "description": "Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", "source_name": "cve", "external_id": "CVE-2010-0188"}]}, {"type": "relationship", "id": "relationship--a50abb5b-e33e-4958-aa1d-5c43040e0e38", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b3bff993-216c-4ce6-be14-9ae0f1a5ffd6", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--59f58cbc-c9f2-494f-ae4d-c43bd0c0bc10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b3bff993-216c-4ce6-be14-9ae0f1a5ffd6", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--a7ba4a00-f018-4f9d-9559-ee80982bd4fe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0640", "description": "Adobe Reader and Acrobat Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0640", "source_name": "cve", "external_id": "CVE-2013-0640"}]}, {"type": "relationship", "id": "relationship--e5b0ccdc-2c80-42b0-86ad-bec3c51ec85a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a7ba4a00-f018-4f9d-9559-ee80982bd4fe", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--2e7b6ef9-7500-41cc-b249-3b3af349b147", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-0641", "description": "Adobe Reader Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0641", "source_name": "cve", "external_id": "CVE-2013-0641"}]}, {"type": "relationship", "id": "relationship--1fa1e1d0-96a4-454f-a4f5-42b6dcd8b04e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2e7b6ef9-7500-41cc-b249-3b3af349b147", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "relationship", "id": "relationship--889f1fd4-0338-45ca-9508-d3f89161bf2e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2e7b6ef9-7500-41cc-b249-3b3af349b147", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--9ce2d6d9-8a5b-4a64-94d7-875fa9db5f17", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2e7b6ef9-7500-41cc-b249-3b3af349b147", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--eb5e71c7-2108-486e-b67d-bc83afadc7ae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2013-3346", "description": "Adobe Reader and Acrobat Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3346", "source_name": "cve", "external_id": "CVE-2013-3346"}]}, {"type": "relationship", "id": "relationship--7c5b9200-cdc0-4a6c-80a6-8a65205c4be3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eb5e71c7-2108-486e-b67d-bc83afadc7ae", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--42e9870c-ebb7-42ce-ae52-8361e29567e7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2014-0496", "description": "Adobe Reader and Acrobat Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0496", "source_name": "cve", "external_id": "CVE-2014-0496"}]}, {"type": "relationship", "id": "relationship--117824a4-3856-4ffe-af28-2b0e179bcf80", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--42e9870c-ebb7-42ce-ae52-8361e29567e7", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--395c7b4b-7e33-4e61-8cb2-d3e16ab07e91", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2016-7855", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7855", "source_name": "cve", "external_id": "CVE-2016-7855"}]}, {"type": "relationship", "id": "relationship--ab80c871-6c0c-4c74-a3ab-fd6d10d7c812", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--395c7b4b-7e33-4e61-8cb2-d3e16ab07e91", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--eb9e6262-992f-4c98-8db6-f9c616c0423b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-11292", "description": "Adobe Flash Player Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11292", "source_name": "cve", "external_id": "CVE-2017-11292"}]}, {"type": "relationship", "id": "relationship--094e82ab-45a0-4904-bfb1-11b4c0646f59", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--eb9e6262-992f-4c98-8db6-f9c616c0423b", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--78d37583-0c8c-4b12-9cae-fb056103d07a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--eb9e6262-992f-4c98-8db6-f9c616c0423b", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--b4718662-8362-4802-913b-d0e4036a41be", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eb9e6262-992f-4c98-8db6-f9c616c0423b", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--a7c99c1d-b037-4e15-88b1-efa8b3e70106", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eb9e6262-992f-4c98-8db6-f9c616c0423b", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--4b13df0e-72ae-4828-925b-51378e2927d5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-15982", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15982", "source_name": "cve", "external_id": "CVE-2018-15982"}]}, {"type": "relationship", "id": "relationship--ddd1fa9b-d764-406e-9742-a2c4119dcca4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b13df0e-72ae-4828-925b-51378e2927d5", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--4a2b50ab-f127-4531-ab7f-52b63c0772c8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b13df0e-72ae-4828-925b-51378e2927d5", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--bcbc437a-a006-4b4d-bc45-252b712b9f03", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2010-1297", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", "source_name": "cve", "external_id": "CVE-2010-1297"}]}, {"type": "relationship", "id": "relationship--e0c9f63a-4201-4a83-a5cc-9ebe3d5fd1d4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bcbc437a-a006-4b4d-bc45-252b712b9f03", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--e83c1f11-eaaa-410c-9bb9-ea25dad56975", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bcbc437a-a006-4b4d-bc45-252b712b9f03", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--dc3853e8-e551-497e-aaa4-f00954badc02", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bcbc437a-a006-4b4d-bc45-252b712b9f03", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--6caa3756-82da-4551-9b85-0b3e04dd47ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2012-5054", "description": "Adobe Flash Player Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5054", "source_name": "cve", "external_id": "CVE-2012-5054"}]}, {"type": "relationship", "id": "relationship--da919920-f348-4ff8-995d-c50c07d2b139", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6caa3756-82da-4551-9b85-0b3e04dd47ea", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--4c0181c1-62a4-4bbf-aba1-d50ad029e102", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2014-8439", "description": "Adobe Flash Player Dereferenced Pointer Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8439", "source_name": "cve", "external_id": "CVE-2014-8439"}]}, {"type": "relationship", "id": "relationship--af45bc28-eb91-4eee-b41f-136896010c25", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4c0181c1-62a4-4bbf-aba1-d50ad029e102", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--083fce35-b8f4-4048-b143-09686af7253e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-8651", "description": "Adobe Flash Player Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8651", "source_name": "cve", "external_id": "CVE-2015-8651"}]}, {"type": "relationship", "id": "relationship--c31f41a8-7c47-4fd5-a7d9-872405283400", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--083fce35-b8f4-4048-b143-09686af7253e", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--a4edf145-a240-4ad8-b7d2-6c0a33043e1b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--083fce35-b8f4-4048-b143-09686af7253e", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--b9f6040e-e2b2-41c7-afe1-0045143d0c4e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--083fce35-b8f4-4048-b143-09686af7253e", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--fdcb534c-26a5-4a6f-b54e-397c50821c10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-0310", "description": "Adobe Flash Player ASLR Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0310", "source_name": "cve", "external_id": "CVE-2015-0310"}]}, {"type": "relationship", "id": "relationship--f8e40b98-03b5-4453-b28b-00688c9db3a0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fdcb534c-26a5-4a6f-b54e-397c50821c10", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--48ced331-515f-418a-babd-d83b99d9e285", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-3113", "description": "Adobe Flash Player Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3113", "source_name": "cve", "external_id": "CVE-2015-3113"}]}, {"type": "relationship", "id": "relationship--64c08886-c10e-4138-b133-109b2a315f60", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--48ced331-515f-418a-babd-d83b99d9e285", "target_ref": "attack-pattern--e4dc8c01-417f-458d-9ee0-bb0617c1b391"}, {"type": "relationship", "id": "relationship--9a23ea62-7ac6-415f-bf69-86e756adb3a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--48ced331-515f-418a-babd-d83b99d9e285", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "relationship", "id": "relationship--3b30a5a1-d26f-4627-96a2-064e3618cb99", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--48ced331-515f-418a-babd-d83b99d9e285", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--16e95dca-072e-4637-8df1-3f6c8b860376", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--48ced331-515f-418a-babd-d83b99d9e285", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--c51762fb-b38b-4f67-9be7-7e980cc6a6b8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2012-2034", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", "source_name": "cve", "external_id": "CVE-2012-2034"}]}, {"type": "relationship", "id": "relationship--6fdf3e40-e23b-4864-b569-cdd5bf8e865e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c51762fb-b38b-4f67-9be7-7e980cc6a6b8", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--e1e4b506-e4d8-40d6-bb20-c2ca3767045a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2011-0611", "description": "Adobe Flash Player Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", "source_name": "cve", "external_id": "CVE-2011-0611"}]}, {"type": "relationship", "id": "relationship--770441fd-e49c-43ba-bede-e90c35e9ef26", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e1e4b506-e4d8-40d6-bb20-c2ca3767045a", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--d0ae6657-b0f8-4bed-b2a2-677fce062904", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e1e4b506-e4d8-40d6-bb20-c2ca3767045a", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--310db64d-d204-440c-a0f7-087b3a289c97", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2012-1535", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", "source_name": "cve", "external_id": "CVE-2012-1535"}]}, {"type": "relationship", "id": "relationship--b074c39c-4949-44e3-a6d3-be949f6c0d82", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--310db64d-d204-440c-a0f7-087b3a289c97", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--592a5b5f-5578-4c0f-be6e-d259e3d4be60", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--310db64d-d204-440c-a0f7-087b3a289c97", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--faeab62b-daf9-4b35-89c2-0f90b8bec56a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--dc89e2ef-053e-4991-aaf1-62e7e6aaf532", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--43d6d043-5908-49ed-909a-f5e11603ba1e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2015-7645", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7645", "source_name": "cve", "external_id": "CVE-2015-7645"}]}, {"type": "relationship", "id": "relationship--f47e01c5-c344-4c9a-a639-fbacc3edde2e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--43d6d043-5908-49ed-909a-f5e11603ba1e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--5f011a52-7832-494c-b1b6-456a74b7d742", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-12812", "description": "Fortinet FortiOS SSL VPN Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12812", "source_name": "cve", "external_id": "CVE-2020-12812"}]}, {"type": "relationship", "id": "relationship--04a6a4c5-77ce-40bb-83b9-800548d335a8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5f011a52-7832-494c-b1b6-456a74b7d742", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "relationship", "id": "relationship--a1785a86-38ce-4893-a6b2-4ab303f2d950", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5f011a52-7832-494c-b1b6-456a74b7d742", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "vulnerability", "id": "vulnerability--7b04f941-67c7-4d4d-a9ef-b23058e32c7e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-5591", "description": "Fortinet FortiOS Default Configuration Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5591", "source_name": "cve", "external_id": "CVE-2019-5591"}]}, {"type": "relationship", "id": "relationship--6f97693d-e27e-4c99-8a98-081a3c03ee75", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7b04f941-67c7-4d4d-a9ef-b23058e32c7e", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--bb79fe86-66aa-4740-8a9e-8c3be27be875", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7b04f941-67c7-4d4d-a9ef-b23058e32c7e", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "relationship", "id": "relationship--819f4a8a-1362-472e-9e97-dc5e0eff4811", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7b04f941-67c7-4d4d-a9ef-b23058e32c7e", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--f25aff4a-9de4-4f87-b380-6095e20294d1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-35464", "description": "ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35464", "source_name": "cve", "external_id": "CVE-2021-35464"}]}, {"type": "relationship", "id": "relationship--12ae31cc-508f-4a20-875f-0ebc94e74376", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f25aff4a-9de4-4f87-b380-6095e20294d1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7bf8615e-7548-4ec1-b6a9-54e73106b776", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f25aff4a-9de4-4f87-b380-6095e20294d1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22986", "description": "F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22986", "source_name": "cve", "external_id": "CVE-2021-22986"}]}, {"type": "relationship", "id": "relationship--8325cae2-b8f3-41d1-8366-f3a7e9e1c06c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--d32b17e2-3a6a-4abe-9bb5-1b60f90b21d7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--67761eb4-0209-490c-955c-32983a07d116", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c757144f-4ed6-4528-a94e-779d2dfc5bc1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "relationship", "id": "relationship--60e86a93-5192-4d7e-9382-444622257ec9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--1061d5bf-57a5-46b4-bd4e-8d65d3be8751", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--63b616ae-4005-4cf3-8c52-b76f218aeec4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1579a2b4-6400-4f5f-a13a-cf567c00d399", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-8657", "description": "EyesOfNetwork Use of Hard-Coded Credentials Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8657", "source_name": "cve", "external_id": "CVE-2020-8657"}]}, {"type": "relationship", "id": "relationship--749357ad-8bff-4b84-91e3-7bc74a40c80f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1579a2b4-6400-4f5f-a13a-cf567c00d399", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "vulnerability", "id": "vulnerability--f0bbaf41-121e-4070-8761-423708f22efd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-6789", "description": "Exim Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6789", "source_name": "cve", "external_id": "CVE-2018-6789"}]}, {"type": "relationship", "id": "relationship--2ced220b-4ba4-426f-bda6-43fdc6b89975", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f0bbaf41-121e-4070-8761-423708f22efd", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d6837b8a-9cab-4441-a44b-937190c554d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f0bbaf41-121e-4070-8761-423708f22efd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0177f3ca-4430-4a7e-bf0c-5dd07d19d670", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--c1e7c1bb-b91d-42f9-83c4-7e63cc73595a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--698b21c2-bcc6-4468-97a9-e386d6d95ad7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--477bf1df-1ce7-4817-96c0-b8049588a2a9", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--2cbe81aa-dc17-4d96-ab91-9c817d0746df", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2018-7600", "description": "Drupal Core Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7600", "source_name": "cve", "external_id": "CVE-2018-7600"}]}, {"type": "relationship", "id": "relationship--9dbf44a9-100f-4734-a143-b498688d0045", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2cbe81aa-dc17-4d96-ab91-9c817d0746df", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--f2919c97-be4a-4df1-8eec-05c042c802a6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2cbe81aa-dc17-4d96-ab91-9c817d0746df", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--eddacdf7-3b0a-440c-a0a9-450fcde4db8b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2cbe81aa-dc17-4d96-ab91-9c817d0746df", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3479be42-9b9e-432c-bb81-ab655d37d8b6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2cbe81aa-dc17-4d96-ab91-9c817d0746df", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--cd836cf0-ebeb-4a62-afed-a2ba5653c94e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-8515", "description": "Multiple DrayTek Vigor Routers Web Management Page Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8515", "source_name": "cve", "external_id": "CVE-2020-8515"}]}, {"type": "relationship", "id": "relationship--30c99405-a516-4983-aba1-9619ab6318d2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cd836cf0-ebeb-4a62-afed-a2ba5653c94e", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--d9bf5a4b-4355-4bc3-95a1-043e9f48995f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cd836cf0-ebeb-4a62-afed-a2ba5653c94e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--317e6684-ad99-4e37-b8db-b34d366030f1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cd836cf0-ebeb-4a62-afed-a2ba5653c94e", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--8f7855f0-6571-4eb8-90ed-07e33a15b41c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-9822", "description": "DotNetNuke (DNN) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9822", "source_name": "cve", "external_id": "CVE-2017-9822"}]}, {"type": "relationship", "id": "relationship--f2657d90-a260-4048-9928-ccc6d466a416", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f7855f0-6571-4eb8-90ed-07e33a15b41c", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--efe10f64-774f-4de5-8ee7-af5e4730f5bc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8f7855f0-6571-4eb8-90ed-07e33a15b41c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--8cb18741-da9c-4675-9462-ab8d349fc31c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8f7855f0-6571-4eb8-90ed-07e33a15b41c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--5fa68d8c-bf21-4a96-ba11-379f75426f77", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-25506", "description": "D-Link DNS-320 Device Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25506", "source_name": "cve", "external_id": "CVE-2020-25506"}]}, {"type": "relationship", "id": "relationship--f55c094e-f181-4366-94ef-c774725c33bf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5fa68d8c-bf21-4a96-ba11-379f75426f77", "target_ref": "attack-pattern--810d8072-afb6-4a56-9ee7-86379ac4a6f3"}, {"type": "relationship", "id": "relationship--1e7c5f27-92fc-41ff-8901-e592f30a96e6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5fa68d8c-bf21-4a96-ba11-379f75426f77", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--df0a8850-8582-42c1-a128-1ac09e2e2e39", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5fa68d8c-bf21-4a96-ba11-379f75426f77", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--18ac3f0e-9145-48e8-96a6-aab95e3a4b6c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-29557", "description": "D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29557", "source_name": "cve", "external_id": "CVE-2020-29557"}]}, {"type": "relationship", "id": "relationship--388d3c0c-1ed8-469f-96f5-e6e029d9f8f9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--18ac3f0e-9145-48e8-96a6-aab95e3a4b6c", "target_ref": "attack-pattern--810d8072-afb6-4a56-9ee7-86379ac4a6f3"}, {"type": "relationship", "id": "relationship--02c56b5f-5b1f-4380-9476-706df3145cc3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--18ac3f0e-9145-48e8-96a6-aab95e3a4b6c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6211d93c-0040-4468-a9af-cf726812554e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--18ac3f0e-9145-48e8-96a6-aab95e3a4b6c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--96137c2f-6e4b-40a3-a537-0edb7681025f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--1250e02f-f9fb-45a7-b59b-14610c971bc4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4aabdc3a-dc8f-4f9a-b2c4-675ab701a71b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--0b96d9f2-1c7e-4ab3-acb4-77bd1cf46f08", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-8193", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8193", "source_name": "cve", "external_id": "CVE-2020-8193"}]}, {"type": "relationship", "id": "relationship--b4252be5-25b3-46f3-93df-3d7d051b040b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0b96d9f2-1c7e-4ab3-acb4-77bd1cf46f08", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "relationship", "id": "relationship--b6ab2e9a-26ab-4618-a0b7-16ca13da60c9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0b96d9f2-1c7e-4ab3-acb4-77bd1cf46f08", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--a730cead-91aa-4fab-94b6-079b21235ffd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-8195", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8195", "source_name": "cve", "external_id": "CVE-2020-8195"}]}, {"type": "relationship", "id": "relationship--2d20dfe5-9dca-4e93-af33-35739f47233f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a730cead-91aa-4fab-94b6-079b21235ffd", "target_ref": "attack-pattern--bb5a00de-e086-4859-a231-fa793f6797e2"}, {"type": "relationship", "id": "relationship--0eda0fec-dd62-4f76-bd9c-b5faa252ee19", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a730cead-91aa-4fab-94b6-079b21235ffd", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--8e1e09ab-234a-445b-bc6c-7f4b0ef8cdc0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a730cead-91aa-4fab-94b6-079b21235ffd", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--09654705-7976-4785-a5aa-e94988fd7cc8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2020-8196", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8196", "source_name": "cve", "external_id": "CVE-2020-8196"}]}, {"type": "relationship", "id": "relationship--1dd5921c-8715-4d1c-8647-6a5b481b8a67", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--09654705-7976-4785-a5aa-e94988fd7cc8", "target_ref": "attack-pattern--bb5a00de-e086-4859-a231-fa793f6797e2"}, {"type": "relationship", "id": "relationship--3f2f6911-59d0-4bc3-b145-a4aee7925120", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--09654705-7976-4785-a5aa-e94988fd7cc8", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--e6ae569f-e5bc-4902-9e04-b670928784a9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--09654705-7976-4785-a5aa-e94988fd7cc8", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--0ef5b84d-17cc-4585-bebd-a1cc23e56905", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-26169", "description": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26169", "source_name": "cve", "external_id": "CVE-2024-26169"}]}, {"type": "relationship", "id": "relationship--09c112bc-5fa0-4433-ad75-d0a0d7932dbe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0ef5b84d-17cc-4585-bebd-a1cc23e56905", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f6ab0537-bc7c-47d5-b112-298c3698bacc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0ef5b84d-17cc-4585-bebd-a1cc23e56905", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "vulnerability", "id": "vulnerability--4df7e0ac-ebb3-4a37-9a0a-bd259d71f93a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-38112", "description": "Microsoft Windows MSHTML Platform Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38112", "source_name": "cve", "external_id": "CVE-2024-38112"}]}, {"type": "relationship", "id": "relationship--00567928-f7eb-49d7-9be8-0c37051a7bcb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4df7e0ac-ebb3-4a37-9a0a-bd259d71f93a", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--d6611629-2dbf-494d-a962-3360a437dd20", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4df7e0ac-ebb3-4a37-9a0a-bd259d71f93a", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--e0a39ef0-0730-43b9-bc9f-5677e09b5012", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-3129", "description": "Laravel Ignition File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3129", "source_name": "cve", "external_id": "CVE-2021-3129"}]}, {"type": "relationship", "id": "relationship--c5416ddc-3664-48e9-959f-23264fc2a27e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e0a39ef0-0730-43b9-bc9f-5677e09b5012", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0467e1fc-ee8d-4f4b-832a-c8171d6bc943", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e0a39ef0-0730-43b9-bc9f-5677e09b5012", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--ffd18e66-15d7-4d11-bf3f-0bd295fb0f50", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-44529", "description": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability ", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44529", "source_name": "cve", "external_id": "CVE-2021-44529"}]}, {"type": "relationship", "id": "relationship--a1f6c36c-1389-4463-80d4-1fcb44170d24", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ffd18e66-15d7-4d11-bf3f-0bd295fb0f50", "target_ref": "attack-pattern--bd369cd9-abb8-41ce-b5bb-fff23ee86c00"}, {"type": "relationship", "id": "relationship--68c63840-f429-4e16-b549-f6ea81aecebf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ffd18e66-15d7-4d11-bf3f-0bd295fb0f50", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b812d114-3104-442e-a2e0-87a51134a35e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-40655", "description": "D-Link DIR-605 Router Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40655", "source_name": "cve", "external_id": "CVE-2021-40655"}]}, {"type": "relationship", "id": "relationship--25059edd-0b19-4948-895c-ade5325da191", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b812d114-3104-442e-a2e0-87a51134a35e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--6a7d7ea9-c84c-4dc7-a6ab-cdab106610c8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-36380", "description": "Sunhillo SureLine OS Command Injection Vulnerablity", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36380", "source_name": "cve", "external_id": "CVE-2021-36380"}]}, {"type": "relationship", "id": "relationship--6f0a7550-d1cf-4ec0-9fe2-2d4eba7b67cd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6a7d7ea9-c84c-4dc7-a6ab-cdab106610c8", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--db3d2efc-53bf-4d77-ab43-44843f0fbdfc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6a7d7ea9-c84c-4dc7-a6ab-cdab106610c8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6a998ead-2301-41b8-83cd-835eaeb8e62f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0ef5b84d-17cc-4585-bebd-a1cc23e56905", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--2dadd5ce-a346-472e-941a-85c4bbfbccaa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-30051", "description": " Microsoft DWM Core Library Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30051", "source_name": "cve", "external_id": "CVE-2024-30051"}]}, {"type": "relationship", "id": "relationship--77d64c7a-2138-458d-bef6-4b02214a92b6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2dadd5ce-a346-472e-941a-85c4bbfbccaa", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--b6902ea6-88c6-47b4-90e5-5a265985be6b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-29492", "description": "Novi Survey Insecure Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29492", "source_name": "cve", "external_id": "CVE-2023-29492"}]}, {"type": "relationship", "id": "relationship--a5aa7544-9402-4757-a8e1-f069fa1a3236", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b6902ea6-88c6-47b4-90e5-5a265985be6b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--79342dcb-6f74-4b84-b39c-22abaae80ffb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6ad4cc76-e797-4e34-bb43-305304dd815d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ae589936-ac67-4650-8f55-a0e94dc2e320", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26138", "description": "Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26138", "source_name": "cve", "external_id": "CVE-2022-26138"}]}, {"type": "relationship", "id": "relationship--88ce1b69-846c-453c-adac-46ffeeba0626", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ae589936-ac67-4650-8f55-a0e94dc2e320", "target_ref": "attack-pattern--837f9164-50af-4ac0-8219-379d8a74cefc"}, {"type": "relationship", "id": "relationship--8ebdd879-696b-4fff-81c6-d5514feb5a69", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--652f559d-e9b1-4081-b20c-8d1493b827e9", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--fc947606-598b-4d53-b190-ac44e93105fd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-22527", "description": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22527", "source_name": "cve", "external_id": "CVE-2023-22527"}]}, {"type": "relationship", "id": "relationship--9e1c0294-5792-4c50-9ff7-2cf6f5aa2932", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fc947606-598b-4d53-b190-ac44e93105fd", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--23893ec8-570d-4373-b958-b91aa58dd985", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fc947606-598b-4d53-b190-ac44e93105fd", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "vulnerability", "id": "vulnerability--c1fa0710-0cee-4c61-8f8b-539611cbd741", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-22518", "description": "Atlassian Confluence Data Center and Server Improper Authorization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22518", "source_name": "cve", "external_id": "CVE-2023-22518"}]}, {"type": "relationship", "id": "relationship--04fac5cb-f465-4126-b67d-63903392ee54", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c1fa0710-0cee-4c61-8f8b-539611cbd741", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--72b42f4a-3843-470c-9bfe-55d97577533a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c1fa0710-0cee-4c61-8f8b-539611cbd741", "target_ref": "attack-pattern--03d7999c-1f4c-42cc-8373-e7690d318104"}, {"type": "relationship", "id": "relationship--38075f6d-0ae5-4400-9e2d-8cfa26713e8d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c1fa0710-0cee-4c61-8f8b-539611cbd741", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--32c3be95-4114-4ed8-a0c0-f9c882ce1185", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27059", "description": "Microsoft Office Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27059", "source_name": "cve", "external_id": "CVE-2021-27059"}]}, {"type": "relationship", "id": "relationship--a0e1b9e0-c495-4bf8-b5c9-6272d1e056a4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--32c3be95-4114-4ed8-a0c0-f9c882ce1185", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--14c6c70e-4b5e-4dd6-aa20-80d260b28807", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-21715", "description": "Microsoft Office Publisher Security Feature Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21715", "source_name": "cve", "external_id": "CVE-2023-21715"}]}, {"type": "relationship", "id": "relationship--82cc90e1-0bf4-480d-b45d-6a03750a4447", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--14c6c70e-4b5e-4dd6-aa20-80d260b28807", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--091ab4dc-7639-4f8f-a6af-40ac2fe88c17", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-23397", "description": "Microsoft Office Outlook Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23397", "source_name": "cve", "external_id": "CVE-2023-23397"}]}, {"type": "relationship", "id": "relationship--06c58c23-027f-4a73-af72-053205997f7f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--091ab4dc-7639-4f8f-a6af-40ac2fe88c17", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--8480a52e-3ed1-48cf-a626-b3fb09878139", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--091ab4dc-7639-4f8f-a6af-40ac2fe88c17", "target_ref": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e"}, {"type": "relationship", "id": "relationship--041db5e2-f141-461d-b7a6-da712e49566f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--091ab4dc-7639-4f8f-a6af-40ac2fe88c17", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--6f2f9243-5a62-4bd5-acdd-318db9054f7e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-27350", "description": "PaperCut MF/NG Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27350", "source_name": "cve", "external_id": "CVE-2023-27350"}]}, {"type": "relationship", "id": "relationship--af8b9377-838b-468a-a32d-f8685e9ca369", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6f2f9243-5a62-4bd5-acdd-318db9054f7e", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--f359fb05-a368-4457-88dd-19592fdd5eee", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6f2f9243-5a62-4bd5-acdd-318db9054f7e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b554c27e-81e0-4c66-b8a7-8039291a60c6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6f2f9243-5a62-4bd5-acdd-318db9054f7e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--94bc02ba-4955-46ac-a750-08f5e1859910", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-37415", "description": "Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37415", "source_name": "cve", "external_id": "CVE-2021-37415"}]}, {"type": "relationship", "id": "relationship--5deb37f9-c884-4e41-8607-6f9826295b56", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--94bc02ba-4955-46ac-a750-08f5e1859910", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-44077", "description": "Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44077", "source_name": "cve", "external_id": "CVE-2021-44077"}]}, {"type": "relationship", "id": "relationship--d6f03984-5b77-4185-85fa-fd3c0559bf45", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--02c2264d-ce67-4920-836a-8b4e4405536a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--00f90846-cbd1-4fc5-9233-df5c2bf2a662"}, {"type": "relationship", "id": "relationship--b4c051bb-a0dd-4441-9b7d-11df31d2ab0b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--c77e3f32-8d8d-4c78-bc99-89b6e3e4eff1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--eae3fa2f-096b-4c79-b1c4-5b99ab5e5576", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--01a5a209-b94c-450b-b7f9-946497d91055"}, {"type": "relationship", "id": "relationship--b5ec47c2-e7aa-4b71-89ef-9b97004dcb24", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--d61e0e42-1eef-4035-9564-83298282ef31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--e6720814-422d-4bb4-9f99-a2c52ec956b3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--457c7820-d331-465a-915e-42f85500ccc4"}, {"type": "relationship", "id": "relationship--6a38f0b7-fd5c-4619-8be7-0b956ba4e922", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--8826e6ab-8fe3-439b-a591-59643b23b615", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--3ccef7ae-cb5e-48f6-8302-897105fbf55c"}, {"type": "relationship", "id": "relationship--71bf57ac-804e-4a27-af1c-638b107385d4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--cb987bbe-e363-4724-ac30-4afeb5a82d3b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--ac2ac987-1cd6-4548-8268-f5d78cdd1503", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0b0bebea-5282-4aa8-8bd7-874108124384", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-44515", "description": "Zoho Desktop Central Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44515", "source_name": "cve", "external_id": "CVE-2021-44515"}]}, {"type": "relationship", "id": "relationship--1e735b05-bdb0-4cdc-aae1-391b66614cc9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--8659e2be-58cc-48b2-9a83-89ee3f8d2f60", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "target_ref": "attack-pattern--15dbf668-795c-41e6-8219-f0447c0e64ce"}, {"type": "relationship", "id": "relationship--997edd19-c4bb-48d2-be5c-b04eb19a97e5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--ac17c30c-65a6-45e5-90d5-17e0c3449817", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--cca683db-6d05-4260-a57d-3477d562f4ac", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a686ad34-77b1-4d94-ad28-56c07b92fd75", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--e46fb09a-a453-45cd-af3d-6784c8c18124", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-28810", "description": "Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28810", "source_name": "cve", "external_id": "CVE-2022-28810"}]}, {"type": "relationship", "id": "relationship--8300c2dd-27bf-4ece-b1cc-739ec7587bc7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e46fb09a-a453-45cd-af3d-6784c8c18124", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--aaab0299-5932-4746-b3c9-b998e39e908e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-35405", "description": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35405", "source_name": "cve", "external_id": "CVE-2022-35405"}]}, {"type": "relationship", "id": "relationship--1e5cd8b7-e4d3-4393-9107-2bbcd861ee0d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--aaab0299-5932-4746-b3c9-b998e39e908e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--7324488b-60fd-494b-8776-3fa397498b1a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4358", "description": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4358", "source_name": "cve", "external_id": "CVE-2024-4358"}]}, {"type": "relationship", "id": "relationship--27b9fd8b-2e59-4c2b-9026-243f986d2d66", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7324488b-60fd-494b-8776-3fa397498b1a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0c30b098-dc73-43b3-861e-73434a118d06", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e83fbf5f-4409-4111-9bda-0d3e901ed766", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-34362", "description": "Progress MOVEit Transfer SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34362", "source_name": "cve", "external_id": "CVE-2023-34362"}]}, {"type": "relationship", "id": "relationship--3d924898-ec00-48de-b95f-b3f855062ebe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--b24e2a20-3b3d-4bf0-823b-1ed765398fb0"}, {"type": "relationship", "id": "relationship--088d94c1-9ab6-41cb-9481-81818dc3d70c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--52a3f900-cdaa-4635-b3e2-6bc7d37ed0d7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--76e25235-4eab-42df-ad5a-428c5a72d406", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--988b7f9e-5ae4-4b0e-84ad-b2aca06c74e7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--7e13550b-4b6a-44dc-aadb-9ad8277558f0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3a22d5b4-5a39-4360-ac21-623724ee80a1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a06636a3-35cb-4d9f-bf67-c8ecb2f0b994", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--7937907f-9289-4076-9d40-fdfcf42fc1b8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-44168", "description": "Fortinet FortiOS Arbitrary File Download", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44168", "source_name": "cve", "external_id": "CVE-2021-44168"}]}, {"type": "relationship", "id": "relationship--a9b860e1-a222-4dc9-97b0-8627c32646cb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7937907f-9289-4076-9d40-fdfcf42fc1b8", "target_ref": "attack-pattern--ae7f3575-0a5e-427e-991b-fe03ad44c754"}, {"type": "relationship", "id": "relationship--09031c02-3ffd-4274-ad72-080b6e2a9158", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7937907f-9289-4076-9d40-fdfcf42fc1b8", "target_ref": "attack-pattern--fdc47f44-dd32-4b99-af5f-209f556f63c2"}, {"type": "vulnerability", "id": "vulnerability--a3cc07bd-bb79-4333-8dfb-401a88a9ba54", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-40684", "description": "Fortinet Multiple Products Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40684", "source_name": "cve", "external_id": "CVE-2022-40684"}]}, {"type": "relationship", "id": "relationship--cf9d5554-dc27-4a40-a745-fe3f8076cb0f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a3cc07bd-bb79-4333-8dfb-401a88a9ba54", "target_ref": "attack-pattern--6b57dc31-b814-4a03-8706-28bc20d739c4"}, {"type": "relationship", "id": "relationship--b67bd680-5a64-4686-8a67-839290782451", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a3cc07bd-bb79-4333-8dfb-401a88a9ba54", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--48bb2bd3-f2c1-4da8-afd0-9eaabd77d410", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41328", "description": "Fortinet FortiOS Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41328", "source_name": "cve", "external_id": "CVE-2022-41328"}]}, {"type": "relationship", "id": "relationship--d449db65-04dd-4be2-ac39-d2a7b53ce09d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--48bb2bd3-f2c1-4da8-afd0-9eaabd77d410", "target_ref": "attack-pattern--7e150503-88e7-4861-866b-ff1ac82c4475"}, {"type": "relationship", "id": "relationship--7b21fbc1-8db7-41f3-b2c8-d64bd80a8c10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--48bb2bd3-f2c1-4da8-afd0-9eaabd77d410", "target_ref": "attack-pattern--1cfcb312-b8d7-47a4-b560-4b16cc677292"}, {"type": "relationship", "id": "relationship--d09157e4-1d6e-42f7-8b04-9f511296eb22", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--48bb2bd3-f2c1-4da8-afd0-9eaabd77d410", "target_ref": "attack-pattern--03259939-0b57-482f-8eb5-87c0e0d54334"}, {"type": "relationship", "id": "relationship--b46e6783-9611-4d68-a215-6236fd261e73", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--48bb2bd3-f2c1-4da8-afd0-9eaabd77d410", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--4843bd19-75f2-4f0b-9289-1adf340f8166", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-42475", "description": "Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42475", "source_name": "cve", "external_id": "CVE-2022-42475"}]}, {"type": "relationship", "id": "relationship--ab22a974-149e-4e61-ad2c-4abe281ae4b3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4843bd19-75f2-4f0b-9289-1adf340f8166", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--de8d1e9c-9890-4c87-a4c8-0227dfe011a7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4843bd19-75f2-4f0b-9289-1adf340f8166", "target_ref": "attack-pattern--e4dc8c01-417f-458d-9ee0-bb0617c1b391"}, {"type": "relationship", "id": "relationship--b1b8645a-c947-4312-b26c-6a5401ccf2f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4843bd19-75f2-4f0b-9289-1adf340f8166", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--eac6ca82-a131-4540-9439-8e0da2e46df0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4843bd19-75f2-4f0b-9289-1adf340f8166", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--fc82de67-7331-4bee-b18c-219b6cb91eec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-48788", "description": "Fortinet FortiClient EMS SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48788", "source_name": "cve", "external_id": "CVE-2023-48788"}]}, {"type": "relationship", "id": "relationship--91411716-a042-48f3-8f39-fde1e6d8e66b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fc82de67-7331-4bee-b18c-219b6cb91eec", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--6054c8f7-a762-4a3a-ade4-401878443063", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fc82de67-7331-4bee-b18c-219b6cb91eec", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2c3a0da3-3725-4c23-98ee-9f6a46b93c16", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fc82de67-7331-4bee-b18c-219b6cb91eec", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--6e9db064-6c14-48a0-9b56-6262c66ae125", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-21762", "description": "Fortinet FortiOS Out-of-Bound Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21762", "source_name": "cve", "external_id": "CVE-2024-21762"}]}, {"type": "relationship", "id": "relationship--acbc5111-fa6d-4168-8614-2017b65ef704", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6e9db064-6c14-48a0-9b56-6262c66ae125", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--adedce32-665d-40da-9e32-4594c9baec7b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6e9db064-6c14-48a0-9b56-6262c66ae125", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--058dff03-8371-4f0e-85d9-8ab5f7dca995", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-27997", "description": "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27997", "source_name": "cve", "external_id": "CVE-2023-27997"}]}, {"type": "relationship", "id": "relationship--c817ea39-0c84-4bf7-9cfb-9f35703a3d66", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--058dff03-8371-4f0e-85d9-8ab5f7dca995", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--8c2b5924-3f63-4c5f-a8f9-94936d1284dc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--058dff03-8371-4f0e-85d9-8ab5f7dca995", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--399e5aca-7b25-4fef-abdb-d1b7cf0a8f3b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--058dff03-8371-4f0e-85d9-8ab5f7dca995", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--53958bb9-3047-497b-b9aa-d3c1a4bf1183", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-6548", "description": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6548", "source_name": "cve", "external_id": "CVE-2023-6548"}]}, {"type": "relationship", "id": "relationship--712163c2-e06c-467b-a2ce-b1c88ae5c4e5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--53958bb9-3047-497b-b9aa-d3c1a4bf1183", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "vulnerability", "id": "vulnerability--2ea68d28-d202-4f1a-a795-fe3bb6a70f38", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-3519", "description": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3519", "source_name": "cve", "external_id": "CVE-2023-3519"}]}, {"type": "relationship", "id": "relationship--329dbd22-af3b-4f6c-aa08-7f50dbd571d0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2ea68d28-d202-4f1a-a795-fe3bb6a70f38", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--62c2c7df-2037-4fec-8089-b72a61cf9de5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2ea68d28-d202-4f1a-a795-fe3bb6a70f38", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--6ed74f47-8616-4045-a5b8-5441b5748bcc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2ea68d28-d202-4f1a-a795-fe3bb6a70f38", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--3508488b-d3e7-415d-beb3-764696f89d4c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2ea68d28-d202-4f1a-a795-fe3bb6a70f38", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ba4eae49-ddea-4a5c-936b-57206abdf486", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-6549", "description": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6549", "source_name": "cve", "external_id": "CVE-2023-6549"}]}, {"type": "relationship", "id": "relationship--102d39a5-7f90-48c5-a601-391c32085d35", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ba4eae49-ddea-4a5c-936b-57206abdf486", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--9deb573e-03c8-495d-94d4-ecbab7059564", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ba4eae49-ddea-4a5c-936b-57206abdf486", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--4615af5f-8998-422d-9aac-7de7210129db", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-4966", "description": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4966", "source_name": "cve", "external_id": "CVE-2023-4966"}]}, {"type": "relationship", "id": "relationship--f679e875-f999-4247-a7a1-86296c63e179", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4615af5f-8998-422d-9aac-7de7210129db", "target_ref": "attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d"}, {"type": "relationship", "id": "relationship--bf0b78a1-51a9-4788-9556-347a1f97cb31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4615af5f-8998-422d-9aac-7de7210129db", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--af51896e-4372-4958-9c33-2825228ff78f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4615af5f-8998-422d-9aac-7de7210129db", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--83c70133-a3fa-4412-bc8f-6f0fd691ef94", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2017-6742", "description": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6742", "source_name": "cve", "external_id": "CVE-2017-6742"}]}, {"type": "relationship", "id": "relationship--55c8be75-3404-49f6-a280-1be050b88b07", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--83c70133-a3fa-4412-bc8f-6f0fd691ef94", "target_ref": "attack-pattern--28abec6c-4443-4b03-8206-07f2e264a6b4"}, {"type": "relationship", "id": "relationship--e9922bf8-a701-4adc-bf92-52dcb48f232b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--83c70133-a3fa-4412-bc8f-6f0fd691ef94", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--021c5bb0-c3e2-46ef-9d93-66285a006dfd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--83c70133-a3fa-4412-bc8f-6f0fd691ef94", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--ccb4b85b-a255-463a-9790-0109cc6bc1d7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-4034", "description": "Red Hat Polkit Out-of-Bounds Read and Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034", "source_name": "cve", "external_id": "CVE-2021-4034"}]}, {"type": "relationship", "id": "relationship--4ef5b5b7-0b3b-4742-95c2-a3dc93003de1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ccb4b85b-a255-463a-9790-0109cc6bc1d7", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--e1789e85-b18b-4c87-80cb-c0d3b2c679c2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "vulnerability", "id": "vulnerability--d79c4d66-b7ff-4010-97cd-0a19068ec966", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-27860", "description": "FatPipe WARP, IPVPN, and MPVPN Configuration Upload exploit", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27860", "source_name": "cve", "external_id": "CVE-2021-27860"}]}, {"type": "relationship", "id": "relationship--7e92d41e-30c6-492f-b093-83111bb3e5a1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d79c4d66-b7ff-4010-97cd-0a19068ec966", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--06a223aa-4db1-4943-8fae-e8eb8d953d78", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-2868", "description": "Barracuda Networks ESG Appliance Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2868", "source_name": "cve", "external_id": "CVE-2023-2868"}]}, {"type": "relationship", "id": "relationship--fdc8f94f-e3fb-425c-97ca-d3f07c23aa9a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--06a223aa-4db1-4943-8fae-e8eb8d953d78", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--d195c745-a97f-4ed7-8bf6-49dcecda1cf2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--06a223aa-4db1-4943-8fae-e8eb8d953d78", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--362b6f4e-b725-4731-8b41-8c9351c19f28", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--06a223aa-4db1-4943-8fae-e8eb8d953d78", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--47b3fd9c-e397-443e-963e-6a0b122e3bb7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--83c70133-a3fa-4412-bc8f-6f0fd691ef94", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "relationship", "id": "relationship--c3eb5a30-2715-49ce-a511-01328326d618", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8f07c546-07a5-429d-89b5-866402233520", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--4278b424-1eb6-45cb-aa60-3720c5f57bad", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d79c4d66-b7ff-4010-97cd-0a19068ec966", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8e291e08-fbc4-4db4-957e-e9d72329a73a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--06a223aa-4db1-4943-8fae-e8eb8d953d78", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--126de5db-d986-42d6-ab4a-109103ef9a6d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-45046", "description": "Apache Log4j2 Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046", "source_name": "cve", "external_id": "CVE-2021-45046"}]}, {"type": "relationship", "id": "relationship--db548960-61ac-43ce-9987-937f65e089b4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--126de5db-d986-42d6-ab4a-109103ef9a6d", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--8fd4c1c1-b655-47be-bf1c-b09c07d2b56a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--5c3cbc6e-f405-4146-8767-17d65824de5e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--4c58a051-b843-4032-95cf-c38b06a07805", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--225d09b1-6dfe-49a9-acc7-9c8eb14611bd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2019-0708", "description": "Microsoft Remote Desktop Services Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708", "source_name": "cve", "external_id": "CVE-2019-0708"}]}, {"type": "relationship", "id": "relationship--9f1ab949-c874-49d7-b208-86818f8522fe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--225d09b1-6dfe-49a9-acc7-9c8eb14611bd", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--28c04ef8-e40c-4962-98fe-e41bcdbfa01c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--225d09b1-6dfe-49a9-acc7-9c8eb14611bd", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--83264538-c6fa-4d49-8d3c-157178486cb3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-42237", "description": "Sitecore XP Remote Command Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42237", "source_name": "cve", "external_id": "CVE-2021-42237"}]}, {"type": "relationship", "id": "relationship--2a91349a-9016-4e69-9bf5-3713fd0841e6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--83264538-c6fa-4d49-8d3c-157178486cb3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0ad40475-6d7f-433d-920d-bfe8ebfde5b8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--126de5db-d986-42d6-ab4a-109103ef9a6d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c3669430-2679-4a2b-b649-a393cdab367c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--49c35dac-f01c-4576-91f3-635244a7622c", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--6fb97ba2-cbdf-4e2b-a407-ec91a9e4d656", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--225d09b1-6dfe-49a9-acc7-9c8eb14611bd", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--88b66802-2c10-4b90-890d-f7b9718bdea5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-20399", "description": "Cisco NX-OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20399", "source_name": "cve", "external_id": "CVE-2024-20399"}]}, {"type": "relationship", "id": "relationship--287d058b-5168-40c8-b8b2-4b030d2e353b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--88b66802-2c10-4b90-890d-f7b9718bdea5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ff5d2df1-f3de-45db-ac00-cab8092ed9ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--88b66802-2c10-4b90-890d-f7b9718bdea5", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--530fe83d-e27c-4d89-a2f4-68bb0e8b1265", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20109", "description": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20109", "source_name": "cve", "external_id": "CVE-2023-20109"}]}, {"type": "relationship", "id": "relationship--fc2cbb55-cd60-4cb1-81e7-88d65bab6b20", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--530fe83d-e27c-4d89-a2f4-68bb0e8b1265", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--cf5d6b08-a578-4940-b879-96dc5cd6ad57", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--530fe83d-e27c-4d89-a2f4-68bb0e8b1265", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7cd09ffc-657a-4d76-9af7-1b92d5f4bdcd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--530fe83d-e27c-4d89-a2f4-68bb0e8b1265", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--185f7bf1-91c7-4a2b-99b7-fb507adb73e0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20269", "description": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20269", "source_name": "cve", "external_id": "CVE-2023-20269"}]}, {"type": "relationship", "id": "relationship--64138797-80eb-4bbd-af81-385561a3a1a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--185f7bf1-91c7-4a2b-99b7-fb507adb73e0", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--b8aeb5d8-889e-4f83-9445-61a77a2d01db", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--185f7bf1-91c7-4a2b-99b7-fb507adb73e0", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--ca071d9c-fa85-48e6-b5c0-b924cd13f99b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-20359", "description": "Cisco ASA and FTD Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20359", "source_name": "cve", "external_id": "CVE-2024-20359"}]}, {"type": "relationship", "id": "relationship--c4621fd9-ae88-44fe-ae1a-e0703408debf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ca071d9c-fa85-48e6-b5c0-b924cd13f99b", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--01ef2ef7-a460-483f-9ca5-10ed75240a2c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca071d9c-fa85-48e6-b5c0-b924cd13f99b", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--99ae6d78-ab78-409b-bfef-3fe3ae880125", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-20353", "description": "Cisco ASA and FTD Denial of Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20353", "source_name": "cve", "external_id": "CVE-2024-20353"}]}, {"type": "relationship", "id": "relationship--11585725-5a15-4131-9557-5034f15ddf9b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--99ae6d78-ab78-409b-bfef-3fe3ae880125", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--7070fba9-d4bb-4afb-af0d-d2e14230808f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--99ae6d78-ab78-409b-bfef-3fe3ae880125", "target_ref": "attack-pattern--ea071aa0-8f17-416f-ab0d-2bab7e79003d"}, {"type": "relationship", "id": "relationship--d2e0679f-5deb-4aaf-8378-a5a93c29d8c0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--99ae6d78-ab78-409b-bfef-3fe3ae880125", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--541c52f1-78aa-4c74-a55b-e12acdead16f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20699", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20699", "source_name": "cve", "external_id": "CVE-2022-20699"}]}, {"type": "relationship", "id": "relationship--b1462790-c977-4826-b2d9-332a4bcedd34", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--541c52f1-78aa-4c74-a55b-e12acdead16f", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--78190d87-264d-4b8d-bec1-087c714b774d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--541c52f1-78aa-4c74-a55b-e12acdead16f", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--3162beff-ffa2-4e50-939b-562a80e92edc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20700", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20700", "source_name": "cve", "external_id": "CVE-2022-20700"}]}, {"type": "relationship", "id": "relationship--bda13972-df27-4345-8125-f793da0b7123", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3162beff-ffa2-4e50-939b-562a80e92edc", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--2f932be7-e3a8-4032-bb93-415cdfdc27ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3162beff-ffa2-4e50-939b-562a80e92edc", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a6658e6f-08dd-4fb8-812d-d7ce6824029c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20701", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20701", "source_name": "cve", "external_id": "CVE-2022-20701"}]}, {"type": "relationship", "id": "relationship--1ea236ec-fc7a-47ee-9f11-e8d9505b0a50", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a6658e6f-08dd-4fb8-812d-d7ce6824029c", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--63ba11cf-50c4-4924-9407-1b401996ad38", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a6658e6f-08dd-4fb8-812d-d7ce6824029c", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--d22a50a4-43a5-4b2c-b5f5-724a458a1f1d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20708", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20708", "source_name": "cve", "external_id": "CVE-2022-20708"}]}, {"type": "relationship", "id": "relationship--bfcb573c-c5ef-4b1d-a0be-af83cd5ac24a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d22a50a4-43a5-4b2c-b5f5-724a458a1f1d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--90ceb3f3-d693-4119-ab2c-1bb498c6cdc5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d22a50a4-43a5-4b2c-b5f5-724a458a1f1d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--61ff8bca-606f-440c-a235-5317d4f91d81", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22005", "description": "VMware vCenter Server File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22005", "source_name": "cve", "external_id": "CVE-2021-22005"}]}, {"type": "relationship", "id": "relationship--aaa15aef-7002-491c-bfa5-5237c28b74c2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--61ff8bca-606f-440c-a235-5317d4f91d81", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b9201458-9c2d-4cdd-9bbd-db71076e75a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--61ff8bca-606f-440c-a235-5317d4f91d81", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--985a4625-02db-438b-9b5d-3d10f4259f5b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22017", "description": "VMware vCenter Server Improper Access Control", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22017", "source_name": "cve", "external_id": "CVE-2021-22017"}]}, {"type": "relationship", "id": "relationship--bc62aeb8-c717-44f9-9da1-7dbc12b69bee", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--985a4625-02db-438b-9b5d-3d10f4259f5b", "target_ref": "attack-pattern--f6dacc85-b37d-458e-b58d-74fc4bbf5755"}, {"type": "relationship", "id": "relationship--3d9bcb00-c916-476c-9f6a-3dc001642b8b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--985a4625-02db-438b-9b5d-3d10f4259f5b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--9558f7f5-fa4d-49b8-ac5a-bddb18873d3f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20821", "description": "Cisco IOS XR Open Port Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20821", "source_name": "cve", "external_id": "CVE-2022-20821"}]}, {"type": "relationship", "id": "relationship--cd383fd4-c73f-4e4e-9545-b103883f7f2c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9558f7f5-fa4d-49b8-ac5a-bddb18873d3f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1776182d-87bb-42bb-bad7-a1ede5be833a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-20703", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20703", "source_name": "cve", "external_id": "CVE-2022-20703"}]}, {"type": "relationship", "id": "relationship--7b9603f2-0103-408e-bc9e-3ec9f4c4c854", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1776182d-87bb-42bb-bad7-a1ede5be833a", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--727c4b78-240f-4cb0-aeed-ce0162d254c7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21973", "description": "VMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21973", "source_name": "cve", "external_id": "CVE-2021-21973"}]}, {"type": "relationship", "id": "relationship--d659e716-8e91-46e6-8ef6-322ebfb752c6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--727c4b78-240f-4cb0-aeed-ce0162d254c7", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--e809bf38-7171-4633-9b7f-bfa04f4dbe3f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--727c4b78-240f-4cb0-aeed-ce0162d254c7", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f536741f-9a48-4790-9813-315973e9fff3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-34048", "description": "VMware vCenter Server Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34048", "source_name": "cve", "external_id": "CVE-2023-34048"}]}, {"type": "relationship", "id": "relationship--d9794ee8-425b-48e6-a8c0-53d382718938", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f536741f-9a48-4790-9813-315973e9fff3", "target_ref": "attack-pattern--7807d3a4-a885-4639-a786-c1ed41484970"}, {"type": "relationship", "id": "relationship--dbd6a2ae-d76b-4a45-a3b2-cda571460745", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f536741f-9a48-4790-9813-315973e9fff3", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--62cded1d-a5d2-4b49-bc92-0994eefa332e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22948", "description": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22948", "source_name": "cve", "external_id": "CVE-2022-22948"}]}, {"type": "relationship", "id": "relationship--58a8e000-a788-43f0-8b92-c8817774380c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--62cded1d-a5d2-4b49-bc92-0994eefa332e", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--8ae5ec5a-0651-401f-8134-0138f6926a2c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--62cded1d-a5d2-4b49-bc92-0994eefa332e", "target_ref": "attack-pattern--9c306d8d-cde7-4b4c-b6e8-d0bb16caca36"}, {"type": "relationship", "id": "relationship--de7095f2-763f-4072-8664-df90de1979a6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--62cded1d-a5d2-4b49-bc92-0994eefa332e", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--7e0339cd-5084-40b2-b49b-dde1caf06e6c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-37085", "description": "VMware ESXi Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37085", "source_name": "cve", "external_id": "CVE-2024-37085"}]}, {"type": "relationship", "id": "relationship--45a2915c-c45d-4464-bf8a-762708e7b6bb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7e0339cd-5084-40b2-b49b-dde1caf06e6c", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--1adb354d-ae0b-4d4d-837d-3a4e2d741e7b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7e0339cd-5084-40b2-b49b-dde1caf06e6c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--fc413c24-89cc-4a4f-a8cd-556a26178c04", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7e0339cd-5084-40b2-b49b-dde1caf06e6c", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--e5b01521-4c80-4bd4-ac62-adba49edaed1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22900", "description": "Ivanti Pulse Connect Secure Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22900", "source_name": "cve", "external_id": "CVE-2021-22900"}]}, {"type": "relationship", "id": "relationship--59182b2c-24d4-4b48-b85e-e8b256eb006d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e5b01521-4c80-4bd4-ac62-adba49edaed1", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--d287e714-183c-4df2-8352-92b2d2dcd17f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e5b01521-4c80-4bd4-ac62-adba49edaed1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--61d8c879-4c4f-4abc-9685-71bfee249996", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22899", "description": "Ivanti Pulse Connect Secure Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22899", "source_name": "cve", "external_id": "CVE-2021-22899"}]}, {"type": "relationship", "id": "relationship--40a1e566-e3d2-4cc7-8150-935aa8c5b760", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--61d8c879-4c4f-4abc-9685-71bfee249996", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--d6f8bb2f-2f2b-4d4d-9285-f4f6cd9c1580", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--61d8c879-4c4f-4abc-9685-71bfee249996", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--5deec806-62b5-4b0d-84e3-5e8f609910bf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22894", "description": "Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22894", "source_name": "cve", "external_id": "CVE-2021-22894"}]}, {"type": "relationship", "id": "relationship--eecbd63d-6680-4ea4-8ef2-04dbf5912a58", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5deec806-62b5-4b0d-84e3-5e8f609910bf", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b9522cbc-5d2b-4fd8-a941-d2335e5c632c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5deec806-62b5-4b0d-84e3-5e8f609910bf", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--afcd61cd-49fa-4055-93dd-e28b625539ad", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22893", "description": "Ivanti Pulse Connect Secure Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22893", "source_name": "cve", "external_id": "CVE-2021-22893"}]}, {"type": "relationship", "id": "relationship--93911358-71f1-4cd8-b9f5-6d990e44e1ff", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--afcd61cd-49fa-4055-93dd-e28b625539ad", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--89d67a19-22dc-4216-b916-ea7972b16378", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--afcd61cd-49fa-4055-93dd-e28b625539ad", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--8139ed86-085b-489f-9de2-da36fc53535b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--afcd61cd-49fa-4055-93dd-e28b625539ad", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--8a059d48-eff0-4d2c-9531-815c3278282f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-46805", "description": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46805", "source_name": "cve", "external_id": "CVE-2023-46805"}]}, {"type": "relationship", "id": "relationship--5f0e3e96-f9d1-4b03-8867-bf17d934447a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8a059d48-eff0-4d2c-9531-815c3278282f", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--85c883bd-f9e2-40aa-a8c8-1c6549c922aa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8a059d48-eff0-4d2c-9531-815c3278282f", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--9fb8e3c5-4f64-4344-9b0e-1d811ebb1b40", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8a059d48-eff0-4d2c-9531-815c3278282f", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--0a67f8cc-a51f-47d9-bf59-c0af3c864036", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8a059d48-eff0-4d2c-9531-815c3278282f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--53205e5a-a78f-47dd-9fa8-b266c5ecf3a6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-21887", "description": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21887", "source_name": "cve", "external_id": "CVE-2024-21887"}]}, {"type": "relationship", "id": "relationship--ec0b6b49-d8f2-473b-89ec-fa37fc2f5662", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--53205e5a-a78f-47dd-9fa8-b266c5ecf3a6", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--084a18ed-f273-4ac2-9c1e-8320d2b094ad", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--53205e5a-a78f-47dd-9fa8-b266c5ecf3a6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a413279d-d8cb-4e3c-9b2d-ca0f0366646b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36851", "description": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36851", "source_name": "cve", "external_id": "CVE-2023-36851"}]}, {"type": "relationship", "id": "relationship--a7faf9ad-c44c-45a5-a7ba-8d69f8477831", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a413279d-d8cb-4e3c-9b2d-ca0f0366646b", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--a9b4273d-cf70-474c-a61c-e0058a50b8c2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a413279d-d8cb-4e3c-9b2d-ca0f0366646b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--76c8f012-03b8-431f-9148-fb703e11cccf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36847", "description": "Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36847", "source_name": "cve", "external_id": "CVE-2023-36847"}]}, {"type": "relationship", "id": "relationship--ebcab41c-591b-4195-a768-654ae4054094", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--76c8f012-03b8-431f-9148-fb703e11cccf", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6e37a140-a769-49cc-84e6-984f133b3a4f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--76c8f012-03b8-431f-9148-fb703e11cccf", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a0f4747d-1792-4fcb-8a27-89ed217aaf0d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36846", "description": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36846", "source_name": "cve", "external_id": "CVE-2023-36846"}]}, {"type": "relationship", "id": "relationship--cdc5fa4a-4ea6-4218-96fb-cb4340994241", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a0f4747d-1792-4fcb-8a27-89ed217aaf0d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cd59df8a-96a6-405a-98fb-ed197d4ae2ed", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a0f4747d-1792-4fcb-8a27-89ed217aaf0d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f3456f8e-bb27-4ecb-82cf-f5642ac7e056", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36845", "description": "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36845", "source_name": "cve", "external_id": "CVE-2023-36845"}]}, {"type": "relationship", "id": "relationship--8b2a3c67-2ad1-4d03-a3d2-5a3d504fa6ac", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f3456f8e-bb27-4ecb-82cf-f5642ac7e056", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--73d96c5e-52b8-4600-8c9d-ceca501eeb10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3456f8e-bb27-4ecb-82cf-f5642ac7e056", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--de09d64e-9883-49ea-9283-c34ff617e2b3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-21893", "description": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21893", "source_name": "cve", "external_id": "CVE-2024-21893"}]}, {"type": "relationship", "id": "relationship--6c42ac6f-c92f-4bf0-bcc2-aee2d4b94c01", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--de09d64e-9883-49ea-9283-c34ff617e2b3", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--c83e7959-67cb-445b-87ff-6da66e821df3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--de09d64e-9883-49ea-9283-c34ff617e2b3", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--582fc9b9-ab2e-4704-ae65-517f34224028", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--de09d64e-9883-49ea-9283-c34ff617e2b3", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--0155cd48-9221-4c7b-b124-1604217fe998", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--de09d64e-9883-49ea-9283-c34ff617e2b3", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a72b2d64-ac91-4cf1-9e4d-c2bdd55872c3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-35078", "description": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35078", "source_name": "cve", "external_id": "CVE-2023-35078"}]}, {"type": "relationship", "id": "relationship--fe14e438-6be8-4456-adb1-26725bd5e918", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a72b2d64-ac91-4cf1-9e4d-c2bdd55872c3", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--0c472d14-754f-4b21-9cc2-303cad66226b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a72b2d64-ac91-4cf1-9e4d-c2bdd55872c3", "target_ref": "attack-pattern--d28ef391-8ed4-45dc-bc4a-2f43abf54416"}, {"type": "relationship", "id": "relationship--84b4e045-4b1f-4edc-9d23-84ccf79add9c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a72b2d64-ac91-4cf1-9e4d-c2bdd55872c3", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--3ee9012f-468b-4c56-91fc-b5a0cc33b6cb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-35081", "description": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35081", "source_name": "cve", "external_id": "CVE-2023-35081"}]}, {"type": "relationship", "id": "relationship--ebae83f7-0a47-45a4-a7fd-83e4951f2d81", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3ee9012f-468b-4c56-91fc-b5a0cc33b6cb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f28e16cf-e211-4172-8436-1edf37b35272", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3ee9012f-468b-4c56-91fc-b5a0cc33b6cb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--657aa23d-57ee-42ae-95ef-b96975e2db85", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-0669", "description": "Fortra GoAnywhere MFT Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0669", "source_name": "cve", "external_id": "CVE-2023-0669"}]}, {"type": "relationship", "id": "relationship--8be5c80a-d1c8-4a65-922b-5ceb9739203d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--657aa23d-57ee-42ae-95ef-b96975e2db85", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--f2fed929-42f0-4ba6-8fad-2b17336c03de", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--657aa23d-57ee-42ae-95ef-b96975e2db85", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "relationship", "id": "relationship--716fd21e-82a6-4b20-bd19-aee7a469f4ff", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--657aa23d-57ee-42ae-95ef-b96975e2db85", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--43403605-fdb4-4c11-afa5-eef6dad6ca8d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-44487", "description": "HTTP/2 Rapid Reset Attack Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487", "source_name": "cve", "external_id": "CVE-2023-44487"}]}, {"type": "relationship", "id": "relationship--3e0efd69-e131-4b9b-a7d3-741071c7448a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--43403605-fdb4-4c11-afa5-eef6dad6ca8d", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--e5a4122c-07cd-43e4-94e6-2f646961731b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--43403605-fdb4-4c11-afa5-eef6dad6ca8d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--3930572e-f038-4c84-8542-9ca3d7262964", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36844", "description": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36844", "source_name": "cve", "external_id": "CVE-2023-36844"}]}, {"type": "relationship", "id": "relationship--4e18a42e-1d72-434e-bd57-db6a69843921", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3930572e-f038-4c84-8542-9ca3d7262964", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--3254c10f-6ef1-4ec3-9ba1-97ecd134fdff", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3930572e-f038-4c84-8542-9ca3d7262964", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--29553b3e-d3dd-4ee6-bf87-59adf50afff9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-49103", "description": "ownCloud graphapi Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49103", "source_name": "cve", "external_id": "CVE-2023-49103"}]}, {"type": "relationship", "id": "relationship--296b820a-9983-429d-aafb-73a0320e222b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--29553b3e-d3dd-4ee6-bf87-59adf50afff9", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "relationship", "id": "relationship--f74e67c3-b404-43b5-a340-47ceb893ec88", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--29553b3e-d3dd-4ee6-bf87-59adf50afff9", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--a013c30a-be34-4773-9b4b-4e2e88bb99a5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--29553b3e-d3dd-4ee6-bf87-59adf50afff9", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--a52e4aa4-40c8-42fd-aed4-693607026595", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20198", "description": "Cisco IOS XE Web UI Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20198", "source_name": "cve", "external_id": "CVE-2023-20198"}]}, {"type": "relationship", "id": "relationship--92dc5828-095a-40f1-baf1-4cd9b4d2e0eb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a52e4aa4-40c8-42fd-aed4-693607026595", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--bb28eef3-3e2f-4227-8043-8c89b5ce75ed", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a52e4aa4-40c8-42fd-aed4-693607026595", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-22515", "description": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22515", "source_name": "cve", "external_id": "CVE-2023-22515"}]}, {"type": "relationship", "id": "relationship--35e781f0-0b04-4b54-9592-9657acd72c26", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--ba41cdfe-c289-4114-bb8d-457421dc0409", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--05a6800f-fc83-4155-baca-3e1d07bd38ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--9f54021b-74bb-40da-a6a0-b7ea76bd29c9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--39a3eba9-4e49-4d6c-a133-e0847d0209d2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b5c73387-c97b-4677-ad3c-a0b504447152", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f8521f34-2803-4a16-8339-4628e51e2a5d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20273", "description": "Cisco IOS XE Web UI Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20273", "source_name": "cve", "external_id": "CVE-2023-20273"}]}, {"type": "relationship", "id": "relationship--6e8a9c2a-8306-4c66-87bc-7972d8d65292", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f8521f34-2803-4a16-8339-4628e51e2a5d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--1b012998-10f7-47b6-81d9-23161716ac90", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f8521f34-2803-4a16-8339-4628e51e2a5d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--8eaff0f0-7e72-4f4b-bb7d-b4ef4e192bd6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f8521f34-2803-4a16-8339-4628e51e2a5d", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--93897828-4f2d-4dfd-91bd-61ff465a7988", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-42793", "description": "JetBrains TeamCity Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42793", "source_name": "cve", "external_id": "CVE-2023-42793"}]}, {"type": "relationship", "id": "relationship--61980002-0816-40f4-975d-206b03033014", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--93897828-4f2d-4dfd-91bd-61ff465a7988", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--50f358b1-2dba-4b2c-b076-2a494cd41dd8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--93897828-4f2d-4dfd-91bd-61ff465a7988", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--3455618b-6f22-4606-863e-2fad3f2c0e73", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4577", "description": "PHP-CGI OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4577", "source_name": "cve", "external_id": "CVE-2024-4577"}]}, {"type": "relationship", "id": "relationship--1f93e884-e7cf-4a7b-8973-16fbe101a0be", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3455618b-6f22-4606-863e-2fad3f2c0e73", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d7830312-205a-44e3-87e1-ff1019bc2113", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3455618b-6f22-4606-863e-2fad3f2c0e73", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--e834fad1-19bc-4f00-9cca-4372188477ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4671", "description": "Google Chromium Visuals Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4671", "source_name": "cve", "external_id": "CVE-2024-4671"}]}, {"type": "relationship", "id": "relationship--dad72679-d86c-4e8b-a486-0606e281d6f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e834fad1-19bc-4f00-9cca-4372188477ea", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--17fde639-91e4-4b7d-9aea-f497ef9784ba", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e834fad1-19bc-4f00-9cca-4372188477ea", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--78175226-913a-49d0-a0d8-bc895ae17e31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4761", "description": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4761", "source_name": "cve", "external_id": "CVE-2024-4761"}]}, {"type": "relationship", "id": "relationship--d3872324-1dfa-4f84-a079-6f32923b0af0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78175226-913a-49d0-a0d8-bc895ae17e31", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4f5935a7-f0e4-4535-89b9-1f1835a73726", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4879", "description": "ServiceNow Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4879", "source_name": "cve", "external_id": "CVE-2024-4879"}]}, {"type": "relationship", "id": "relationship--8e7f147f-eeb4-4ae5-bb12-3eeb6fcdec38", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4f5935a7-f0e4-4535-89b9-1f1835a73726", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c71b9bf9-367c-49f8-bf7f-e8d42ef9fa01", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4f5935a7-f0e4-4535-89b9-1f1835a73726", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--36976c8c-61c8-4d97-84dd-9b26dbf6eef7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4947", "description": "Google Chromium V8 Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4947", "source_name": "cve", "external_id": "CVE-2024-4947"}]}, {"type": "relationship", "id": "relationship--5ddf10e1-2734-45bf-b201-5e272ab035b4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--36976c8c-61c8-4d97-84dd-9b26dbf6eef7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--1f5a9f47-27e0-4400-984d-6bd6e6791a11", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--36976c8c-61c8-4d97-84dd-9b26dbf6eef7", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--664653c1-6f47-4549-a28d-2024286281cd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-4978", "description": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4978", "source_name": "cve", "external_id": "CVE-2024-4978"}]}, {"type": "relationship", "id": "relationship--a1aa67b8-efc8-489c-8080-9a0aa9b3db06", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--664653c1-6f47-4549-a28d-2024286281cd", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--1f7cd383-2a94-49e0-a08b-674e661aaae8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--664653c1-6f47-4549-a28d-2024286281cd", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--088a249c-aa59-4bee-ae61-4bdc7892976c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--664653c1-6f47-4549-a28d-2024286281cd", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--5c0f4f02-7087-4ade-b798-676e18a4eac8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--664653c1-6f47-4549-a28d-2024286281cd", "target_ref": "attack-pattern--bd369cd9-abb8-41ce-b5bb-fff23ee86c00"}, {"type": "vulnerability", "id": "vulnerability--f8b1075e-5210-486c-ac9c-06a695642374", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-5217", "description": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5217", "source_name": "cve", "external_id": "CVE-2024-5217"}]}, {"type": "relationship", "id": "relationship--fd1fb347-604b-4409-9dda-2fd8876eb968", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f8b1075e-5210-486c-ac9c-06a695642374", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--e181253f-d2f9-4073-aac3-67a6d50f1144", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-29303", "description": "SolarView Compact Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29303", "source_name": "cve", "external_id": "CVE-2022-29303"}]}, {"type": "relationship", "id": "relationship--413462d2-b5a3-4046-b5ba-9527083bf71e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e181253f-d2f9-4073-aac3-67a6d50f1144", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--13fc0244-8a7c-4177-956f-a9a556f3580d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e181253f-d2f9-4073-aac3-67a6d50f1144", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-1389", "description": "TP-Link Archer AX-21 Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1389", "source_name": "cve", "external_id": "CVE-2023-1389"}]}, {"type": "relationship", "id": "relationship--1a78bbff-acda-421a-ba1e-3c649e8bfdf7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--5f56d551-d1a9-40a4-926b-903b77a29002", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "relationship", "id": "relationship--9ff6237a-fcf9-46c8-9887-931939fb1fca", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--629215d0-e385-42aa-b1a4-891d8599b0da", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--0cf96f6f-8022-43a5-b0bc-742a330805e2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--26fe5360-2cbe-42a9-8f00-efa9513136f1", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "vulnerability", "id": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-27532", "description": "Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27532", "source_name": "cve", "external_id": "CVE-2023-27532"}]}, {"type": "relationship", "id": "relationship--938a8ca9-5ea3-450d-b741-5cd095d087fc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--8c91519d-58b9-48ec-bca7-7802eb7e6f06", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--8a1a1377-1b7b-4ce2-a3a6-43939b89bd52", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--996728b6-80b4-4aa5-addd-04a2a97d24fb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--25659dd6-ea12-45c4-97e6-381e3e4b593e"}, {"type": "relationship", "id": "relationship--47b31530-70a1-4c11-a737-33e14730ec4b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--a36f1cdc-9b9d-4048-9b76-d8177f992b50", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--823d178e-acd3-4a3a-8855-7b9e35e2d648", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--da7e44d3-11fa-49d6-84ac-e9db504ded16", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-32315", "description": "Ignite Realtime Openfire Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32315", "source_name": "cve", "external_id": "CVE-2023-32315"}]}, {"type": "relationship", "id": "relationship--8f0f92f1-8069-4dd1-a1e6-008cc623d654", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--da7e44d3-11fa-49d6-84ac-e9db504ded16", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--cb341f9e-95bc-4f59-ab47-140a9a735cc5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--da7e44d3-11fa-49d6-84ac-e9db504ded16", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--2eab6877-1328-4cf1-a130-45f417b30056", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--da7e44d3-11fa-49d6-84ac-e9db504ded16", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--202face9-3ec6-409d-9038-71f3193f7272", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--da7e44d3-11fa-49d6-84ac-e9db504ded16", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "vulnerability", "id": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-38831", "description": "RARLAB WinRAR Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38831", "source_name": "cve", "external_id": "CVE-2023-38831"}]}, {"type": "relationship", "id": "relationship--2a3069fa-fc4c-401f-ab9b-6c1154034b60", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--beeaaccf-6676-44e1-a2f1-a49c8f60f030", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "relationship", "id": "relationship--a47e61fc-2026-4c06-b8fb-c3dabd3b4a25", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--35dd844a-b219-4e2b-a6bb-efa9a75995a9"}, {"type": "relationship", "id": "relationship--6255a71b-fc19-405a-84c6-ad1696c4d295", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--9b50b4af-f531-4281-9b1e-42e962feb6d8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--462e1d5f-2d4d-4264-b03e-2e52b55d8c47", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--c19b4298-aa48-4de1-8637-6fa50db7472b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e181253f-d2f9-4073-aac3-67a6d50f1144", "target_ref": "attack-pattern--d456de47-a16f-4e46-8980-e67478a12dcb"}, {"type": "relationship", "id": "relationship--9bb79631-d7b6-49aa-ac8b-a78b93557fb8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--9f4241a9-5e72-4920-a4c4-11579b1da779", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--308f9c61-dba6-4349-b351-b446e2900f05", "target_ref": "attack-pattern--8c32eb4d-805f-4fc5-bf60-c4d476c131b5"}, {"type": "vulnerability", "id": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-23692", "description": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23692", "source_name": "cve", "external_id": "CVE-2024-23692"}]}, {"type": "relationship", "id": "relationship--5e449a5c-ffa7-48ef-9a7c-0f680b9c8cde", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--94c902ab-82c7-4867-b60e-76521d068237", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--f58e42ff-5487-4c97-8dbc-62b8cf62c030", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--f7fe9509-e4cd-4ef2-9826-4906871cacb3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "vulnerability", "id": "vulnerability--1d9fcb22-220c-43fd-aa78-182d07c8e314", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-49897", "description": "FXC AE1021, AE1021PE OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49897", "source_name": "cve", "external_id": "CVE-2023-49897"}]}, {"type": "relationship", "id": "relationship--76d2de5d-d466-4717-972e-b29bdd686441", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1d9fcb22-220c-43fd-aa78-182d07c8e314", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--71b5f35f-831f-4188-8321-df46356c059e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1d9fcb22-220c-43fd-aa78-182d07c8e314", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--8cd70848-7664-4381-be86-4228814f941a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1d9fcb22-220c-43fd-aa78-182d07c8e314", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--214e8391-ce38-49a7-be16-1f4bbbca7e7b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-47565", "description": "QNAP VioStor NVR OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47565", "source_name": "cve", "external_id": "CVE-2023-47565"}]}, {"type": "relationship", "id": "relationship--38be852f-65a5-4bc9-b007-459d59be2e92", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--214e8391-ce38-49a7-be16-1f4bbbca7e7b", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--2ad42e91-e9b6-42c6-822e-e67d59a27d21", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--214e8391-ce38-49a7-be16-1f4bbbca7e7b", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--aff3f7af-1811-4c24-8d4c-d9c40e3465a3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1602681f-7c54-4545-a19e-1f8e545ebbec", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "relationship", "id": "relationship--58bcb988-090c-4da5-b734-82ffad743882", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--214e8391-ce38-49a7-be16-1f4bbbca7e7b", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-24919", "description": "Check Point Quantum Security Gateways Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24919", "source_name": "cve", "external_id": "CVE-2024-24919"}]}, {"type": "relationship", "id": "relationship--ec2dcfa1-b985-4ab1-8f76-cc96475cb489", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--e4f1ac5f-941f-4995-a51a-cd61190fa564", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "target_ref": "attack-pattern--d0b4fcdb-d67d-4ed2-99ce-788b12f8c0f4"}, {"type": "relationship", "id": "relationship--34cf8d61-6e34-437a-bdb9-355b3fe6f386", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--20a4f652-4f00-4964-bf0b-c15f3db60bb1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--eff404de-72d8-4d13-8a5b-92b446353535", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--922ae977-00e7-4082-9fad-c91820c88fa4", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "vulnerability", "id": "vulnerability--5804da16-ebba-4435-be83-729194a13f4e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-33246", "description": "Apache RocketMQ Command Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246", "source_name": "cve", "external_id": "CVE-2023-33246"}]}, {"type": "relationship", "id": "relationship--3142afdd-f1f6-4322-b1f4-e895eb851d9d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5804da16-ebba-4435-be83-729194a13f4e", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--2cad2a30-6bf8-4b9e-b07d-5c340c2c28c6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5804da16-ebba-4435-be83-729194a13f4e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--87f4eb70-cea7-4553-aca4-df872aedd934", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5804da16-ebba-4435-be83-729194a13f4e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--9029cada-2f03-433c-9ecd-8a704b1ae705", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-46604", "description": "Apache ActiveMQ Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46604", "source_name": "cve", "external_id": "CVE-2023-46604"}]}, {"type": "relationship", "id": "relationship--2edc54c6-48e3-4c3b-a581-3b3d7f8355c2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9029cada-2f03-433c-9ecd-8a704b1ae705", "target_ref": "attack-pattern--005a06c6-14bf-4118-afa0-ebcd8aebb0c9"}, {"type": "relationship", "id": "relationship--dbf71a6a-2152-4ee1-b672-a711468075c0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9029cada-2f03-433c-9ecd-8a704b1ae705", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--38f9d4b6-f500-4a7f-bd07-9147ffa13f82", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9029cada-2f03-433c-9ecd-8a704b1ae705", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--3fb7daac-e646-451b-a0e9-ab392c2e694f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-27524", "description": "Apache Superset Insecure Default Initialization of Resource Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27524", "source_name": "cve", "external_id": "CVE-2023-27524"}]}, {"type": "relationship", "id": "relationship--22596d81-9bd7-4582-a3fb-f85017fc5523", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3fb7daac-e646-451b-a0e9-ab392c2e694f", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--04b2e302-9409-4f8f-bfe4-cfe26772c372", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3fb7daac-e646-451b-a0e9-ab392c2e694f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ff6fa9c1-255d-4b83-8bfb-7b94717c4337", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-0028", "description": "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0028", "source_name": "cve", "external_id": "CVE-2022-0028"}]}, {"type": "relationship", "id": "relationship--c286143b-48ba-4012-a4d6-c276b1ce48bd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ff6fa9c1-255d-4b83-8bfb-7b94717c4337", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--9916d85a-35cc-4ffb-b8d3-55b399457550", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ff6fa9c1-255d-4b83-8bfb-7b94717c4337", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-28252", "description": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28252", "source_name": "cve", "external_id": "CVE-2023-28252"}]}, {"type": "relationship", "id": "relationship--6d5c91bd-6f7b-4e63-b90c-f582f75ad871", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--57baea8e-65b5-487a-a72a-700948769cbd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "relationship", "id": "relationship--aa6a679f-f49a-4c4b-9e04-ac626e58e7ae", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--294cbc67-5dff-4496-8ac5-d3d28869399a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--044ecbb4-b006-4bb1-85c1-1372ac667847", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--5597a10d-a840-4d58-876a-248703d27b2d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--ba911a0e-46c4-4476-a90c-7af7272167e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--267e8a30-8e98-48b9-907c-ff1312719bbb", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--88dfca7e-6ddd-4211-8ec1-c85edc385d62", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-21674", "description": "Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21674", "source_name": "cve", "external_id": "CVE-2023-21674"}]}, {"type": "relationship", "id": "relationship--809ebcd5-3d15-4e1f-8602-cd09cf3e4bda", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--88dfca7e-6ddd-4211-8ec1-c85edc385d62", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--838f57c9-ce79-4f4f-a6dc-52f5f5a40e5d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--88dfca7e-6ddd-4211-8ec1-c85edc385d62", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--b28655e5-53a8-4bc0-8625-13479ba1d432", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-28229", "description": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28229", "source_name": "cve", "external_id": "CVE-2023-28229"}]}, {"type": "relationship", "id": "relationship--07b7df65-010d-4273-a0ec-12e4b2ec5e69", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b28655e5-53a8-4bc0-8625-13479ba1d432", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--5aac01c9-4d53-4df7-a972-e94000cc6766", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b28655e5-53a8-4bc0-8625-13479ba1d432", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--04d9ee78-2a6b-470e-8cfb-1eb95ccd3787", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26904", "description": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26904", "source_name": "cve", "external_id": "CVE-2022-26904"}]}, {"type": "relationship", "id": "relationship--acff4afc-065a-42b5-a84e-2b6699c7bb43", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--04d9ee78-2a6b-470e-8cfb-1eb95ccd3787", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--43437cac-cfe0-41f6-ba42-8722f27cd8b9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--04d9ee78-2a6b-470e-8cfb-1eb95ccd3787", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--7860b62c-6e09-43b0-82c1-b3d32d7cbb37", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-21919", "description": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21919", "source_name": "cve", "external_id": "CVE-2022-21919"}]}, {"type": "relationship", "id": "relationship--dc54d454-0916-420a-9ec1-ed79c68b2181", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7860b62c-6e09-43b0-82c1-b3d32d7cbb37", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--5602f445-cd79-40a3-a470-cd04c634c369", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7860b62c-6e09-43b0-82c1-b3d32d7cbb37", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-21999", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21999", "source_name": "cve", "external_id": "CVE-2022-21999"}]}, {"type": "relationship", "id": "relationship--ec8f4eee-357b-4163-9508-004ec1eee0c5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "target_ref": "attack-pattern--635cbe30-392d-4e27-978e-66774357c762"}, {"type": "relationship", "id": "relationship--ca951289-0a84-4968-af19-48de166639ca", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "target_ref": "attack-pattern--fe926152-f431-4baf-956c-4ad3cb0bf23b"}, {"type": "relationship", "id": "relationship--76536678-e146-4f6f-ba58-c0e3411ed29f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7768221e-f330-4409-83cb-561320c9880e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--e97d12ec-630b-48a4-b83e-1f46e30e9807", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7cf693d2-6750-48da-8300-c0ac7d08ca4d", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--59accf7a-b2f6-4680-bc4d-e9f4da33bfd1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22718", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22718", "source_name": "cve", "external_id": "CVE-2022-22718"}]}, {"type": "relationship", "id": "relationship--478596a5-6e9b-4302-9548-5123b495969c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--59accf7a-b2f6-4680-bc4d-e9f4da33bfd1", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--c9b14a98-af19-4b95-b97b-e446689a98f2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--59accf7a-b2f6-4680-bc4d-e9f4da33bfd1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--fa9f53f9-11c1-4e7c-b4b9-d2c94f6344ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41073", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41073", "source_name": "cve", "external_id": "CVE-2022-41073"}]}, {"type": "relationship", "id": "relationship--f8988c33-4337-40aa-a4cf-e2d4ba1bc13c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa9f53f9-11c1-4e7c-b4b9-d2c94f6344ec", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--053c546a-6a56-4634-a2dc-5aa23616d717", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa9f53f9-11c1-4e7c-b4b9-d2c94f6344ec", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--065bf749-67a7-45a4-8f91-83941e6fe7f3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fa9f53f9-11c1-4e7c-b4b9-d2c94f6344ec", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--413b5f31-980b-4ad6-83de-281ad2282ce4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-37969", "description": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37969", "source_name": "cve", "external_id": "CVE-2022-37969"}]}, {"type": "relationship", "id": "relationship--045438f9-bb1e-435d-a070-7976eb85f591", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--413b5f31-980b-4ad6-83de-281ad2282ce4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--8d8609f3-ff99-4e78-8e9c-a65723257892", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--413b5f31-980b-4ad6-83de-281ad2282ce4", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--2ec62873-9c71-4f2c-858e-9780c0777e42", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--413b5f31-980b-4ad6-83de-281ad2282ce4", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--29d8711c-af30-4ff7-a70a-1c5bdf3809ac", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41033", "description": "Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41033", "source_name": "cve", "external_id": "CVE-2022-41033"}]}, {"type": "relationship", "id": "relationship--1d01c393-fb3b-43a0-86d9-7616067d7422", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--29d8711c-af30-4ff7-a70a-1c5bdf3809ac", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--9edb1029-9b05-47e0-a58f-c562adbcb632", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--29d8711c-af30-4ff7-a70a-1c5bdf3809ac", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--9c1d0d69-2942-4ce3-b3d7-3642fdd2138a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41125", "description": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41125", "source_name": "cve", "external_id": "CVE-2022-41125"}]}, {"type": "relationship", "id": "relationship--9a3e0339-4031-48e8-ac28-3771f3d3d889", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9c1d0d69-2942-4ce3-b3d7-3642fdd2138a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--68f56d75-742b-450d-a0bc-f9e65078a85a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9c1d0d69-2942-4ce3-b3d7-3642fdd2138a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--d724f3db-bafa-4aec-aafc-e5c884e8b883", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9c1d0d69-2942-4ce3-b3d7-3642fdd2138a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--e6c87543-1f92-49bf-8847-be5961774640", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22047", "description": "Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22047", "source_name": "cve", "external_id": "CVE-2022-22047"}]}, {"type": "relationship", "id": "relationship--5e8b19dd-10af-4419-be49-ee6c8cd8e82e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e6c87543-1f92-49bf-8847-be5961774640", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--32f4724d-5548-4d33-bfc4-bb25e0c92f9d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e6c87543-1f92-49bf-8847-be5961774640", "target_ref": "attack-pattern--9efb1ea7-c37b-4595-9640-b7680cd84279"}, {"type": "relationship", "id": "relationship--76496df1-ec96-4e21-890e-a9026586ee25", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e6c87543-1f92-49bf-8847-be5961774640", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--95cbb8c8-97a8-4493-85ff-4623809e96e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e6c87543-1f92-49bf-8847-be5961774640", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--4180b9f1-e477-429e-ac9b-feaebee3a5c7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-24521", "description": "Microsoft Windows CLFS Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24521", "source_name": "cve", "external_id": "CVE-2022-24521"}]}, {"type": "relationship", "id": "relationship--584f7ccd-4edf-47a7-9e8f-0dbc85f93b58", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4180b9f1-e477-429e-ac9b-feaebee3a5c7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--53042566-3e51-436c-a627-f329b92c6b89", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4180b9f1-e477-429e-ac9b-feaebee3a5c7", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--f5174d6e-2515-4264-8662-8cefac0ec3b8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4180b9f1-e477-429e-ac9b-feaebee3a5c7", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--7492cca9-7ff7-4074-97ea-b917d609729a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-36934", "description": "Microsoft Windows SAM Local Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36934", "source_name": "cve", "external_id": "CVE-2021-36934"}]}, {"type": "relationship", "id": "relationship--db5505aa-141d-48c6-b069-eb3bc4a23e7e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7492cca9-7ff7-4074-97ea-b917d609729a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--adabe9e5-a89c-42c8-b51e-8c15d7bcbcfe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7492cca9-7ff7-4074-97ea-b917d609729a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-40449", "description": "Microsoft Windows Win32k Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40449", "source_name": "cve", "external_id": "CVE-2021-40449"}]}, {"type": "relationship", "id": "relationship--07c714fb-4230-40b7-be97-8d9757e7151a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--381bbd8b-a6d0-40cd-9c6f-18251abff39c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--26fa206a-cc49-4779-b996-592554809939", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--707399d6-ab3e-4963-9315-d9d3818cd6a0"}, {"type": "relationship", "id": "relationship--69b225d1-aef8-4be0-9045-643288a69be0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--ee109a52-3c0b-4f2c-abd0-1ad2fcbbd543", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--8565a3fb-ecf0-496a-8122-26d29538fd73", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--464dffbc-548d-4f22-bfe9-30095f45eb0e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--82ac7548-54d4-447e-81c2-bedfb2858b47", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fa5e646e-5a67-4666-810e-698c1699113f", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "vulnerability", "id": "vulnerability--b22edabc-3da6-4a58-a636-33ec931836aa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-41379", "description": "Microsoft Windows Installer Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41379", "source_name": "cve", "external_id": "CVE-2021-41379"}]}, {"type": "relationship", "id": "relationship--5e0ff51d-46ec-4ed3-bcd5-d33397cffade", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b22edabc-3da6-4a58-a636-33ec931836aa", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--8e709e28-0b1a-4c9f-b70c-e5cf32b584dd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b22edabc-3da6-4a58-a636-33ec931836aa", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--79f15a07-e722-4d34-a169-4b28a96a5485", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2024-27198", "description": "JetBrains TeamCity Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27198", "source_name": "cve", "external_id": "CVE-2024-27198"}]}, {"type": "relationship", "id": "relationship--8aa0f8fd-00f9-49a2-a60f-4dc665c0212d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--79f15a07-e722-4d34-a169-4b28a96a5485", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--5d03936c-23af-4a8f-9693-3d624593fdfe", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--79f15a07-e722-4d34-a169-4b28a96a5485", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--e778d4a2-de78-4439-907d-914dccd33e72", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-23131", "description": "Zabbix Frontend Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23131", "source_name": "cve", "external_id": "CVE-2022-23131"}]}, {"type": "relationship", "id": "relationship--b76da01c-dc66-4df5-adb7-d7972b8e4814", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e778d4a2-de78-4439-907d-914dccd33e72", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--bd59676e-d2b6-49b0-bfbc-8a752863c26c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e778d4a2-de78-4439-907d-914dccd33e72", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ce1d11e4-db17-4835-91b3-eb6f1076f944", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e778d4a2-de78-4439-907d-914dccd33e72", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "relationship", "id": "relationship--7da788c2-79d2-4b9d-8073-ae3915625d93", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e778d4a2-de78-4439-907d-914dccd33e72", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-1040", "description": "Sophos Firewall Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1040", "source_name": "cve", "external_id": "CVE-2022-1040"}]}, {"type": "relationship", "id": "relationship--38e6b9b7-fe27-4c50-a781-ecf20646bd8c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--3257eb21-f9a7-4430-8de1-d8b6e288f529"}, {"type": "relationship", "id": "relationship--f421bb04-4d3a-4599-a114-54b3f3c5bf2a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--49edeab0-92e2-474b-ba9f-ecebe7f6cb73", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--a46466bf-54a7-4c8a-bdb3-6a7cfb4fa05d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "relationship", "id": "relationship--e145f712-490e-4d25-8444-94611e0e78c1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--bf9b13f1-fd06-4fa5-9108-58e1e141e385", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5319b13d-c4b7-4f99-819a-e72c18b8db1a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--c71d0536-67c6-4203-be65-d34fb49506c0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-5631", "description": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5631", "source_name": "cve", "external_id": "CVE-2023-5631"}]}, {"type": "relationship", "id": "relationship--05ad4fe2-e1e5-44b0-8c24-698b310d9483", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c71d0536-67c6-4203-be65-d34fb49506c0", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--49179ba5-8d64-46e3-bd16-b3d94a4c497f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c71d0536-67c6-4203-be65-d34fb49506c0", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--db0b077f-36c1-4084-bea0-0dc72806e356", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c71d0536-67c6-4203-be65-d34fb49506c0", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--475214a3-3fda-42b9-807e-8975fe5db4fc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-43770", "description": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43770", "source_name": "cve", "external_id": "CVE-2023-43770"}]}, {"type": "relationship", "id": "relationship--b35889c4-c31c-44e5-b0e0-ad50f9bdbbbb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--475214a3-3fda-42b9-807e-8975fe5db4fc", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--3b105589-d777-4e4a-855d-e1d7a32e8c2c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--475214a3-3fda-42b9-807e-8975fe5db4fc", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--32bbe26e-2a29-4765-bc1e-0253e580dddf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--475214a3-3fda-42b9-807e-8975fe5db4fc", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--2cde8842-c41e-4007-9b2c-1fe82d7cedbc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-24682", "description": "Zimbra Webmail Cross-Site Scripting Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24682", "source_name": "cve", "external_id": "CVE-2022-24682"}]}, {"type": "relationship", "id": "relationship--27f172d5-07f7-4a5d-acc9-729912e2bd12", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2cde8842-c41e-4007-9b2c-1fe82d7cedbc", "target_ref": "attack-pattern--544b0346-29ad-41e1-a808-501bb4193f47"}, {"type": "relationship", "id": "relationship--fcfbe40b-c197-4a6e-8e02-2aaef8cc778e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2cde8842-c41e-4007-9b2c-1fe82d7cedbc", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--5688e9a8-d823-42ce-aa7a-49be9e253394", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2cde8842-c41e-4007-9b2c-1fe82d7cedbc", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--750564ad-305d-4617-aa2f-1f2bb81a8c5a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-39197", "description": "Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39197", "source_name": "cve", "external_id": "CVE-2022-39197"}]}, {"type": "relationship", "id": "relationship--4a05831d-db97-44a1-a52d-48023f2f9fa8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--750564ad-305d-4617-aa2f-1f2bb81a8c5a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--22fcbfb3-aeff-4a0f-8065-add0251dadf6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--750564ad-305d-4617-aa2f-1f2bb81a8c5a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--bdb8cfd2-d045-42ce-aa12-0ea3402fea84", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-41179", "description": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41179", "source_name": "cve", "external_id": "CVE-2023-41179"}]}, {"type": "relationship", "id": "relationship--993456f8-c241-44b9-a2e2-069980c9c2e7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bdb8cfd2-d045-42ce-aa12-0ea3402fea84", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--15bba1ae-e40c-41b6-8c7e-c218b5b2f96c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bdb8cfd2-d045-42ce-aa12-0ea3402fea84", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--27a495c1-cdc6-4a54-978f-c1d86afd0f71", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-7101", "description": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7101", "source_name": "cve", "external_id": "CVE-2023-7101"}]}, {"type": "relationship", "id": "relationship--21345a85-cdec-4cdc-8f7f-f917ab007bc8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27a495c1-cdc6-4a54-978f-c1d86afd0f71", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--f3dae065-315a-433b-8cdc-3c30fe57566e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27a495c1-cdc6-4a54-978f-c1d86afd0f71", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f6ca936c-df91-4e0e-9eef-ebc941fd26df", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27a495c1-cdc6-4a54-978f-c1d86afd0f71", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-22952", "description": "Multiple SugarCRM Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22952", "source_name": "cve", "external_id": "CVE-2023-22952"}]}, {"type": "relationship", "id": "relationship--eaa64738-af30-4b35-af49-6148b22dfbff", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--3298ce88-1628-43b1-87d9-0b5336b193d7"}, {"type": "relationship", "id": "relationship--c539a0ab-62f5-466b-9b8f-80968d025bea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--eb062747-2193-45de-8fa2-e62549c37ddf"}, {"type": "relationship", "id": "relationship--45190f8e-51cf-4320-959f-21bf40c55dbd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--767dbf9e-df3f-45cb-8998-4903ab5f80c0"}, {"type": "relationship", "id": "relationship--f7375e8f-c219-459d-b2cc-c6520dc3efbf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--759ccb73-ceae-4f87-b69f-d81e6ea3cd24", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--ac08589e-ee59-4935-8667-d845e38fe579"}, {"type": "relationship", "id": "relationship--70d1b31e-e3fc-4020-8693-be8c92ec238e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--3bdfbf94-8032-4c83-b1b1-e76f23dc60fc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--d1ca713c-e4da-4213-94d8-31529887d779", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--ba7465c8-ad61-4871-8912-2b31e4f32114", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d1fd24ef-fe9a-46c3-a0ac-e62833fd90df", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ac5ab859-6fd6-4ef4-a9a2-dca0b2610a68", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--331267fb-2311-413a-9e01-391628c971cb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-35914", "description": "Teclib GLPI Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35914", "source_name": "cve", "external_id": "CVE-2022-35914"}]}, {"type": "relationship", "id": "relationship--606d37c9-696f-4f09-acdd-f254313ac20b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--331267fb-2311-413a-9e01-391628c971cb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ab725f56-69dd-4a2d-b48a-7bc693cda490", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--331267fb-2311-413a-9e01-391628c971cb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--068ef94b-36f8-4b9d-9065-ba4a60c9d9cd", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22965", "description": "Spring Framework JDK 9+ Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965", "source_name": "cve", "external_id": "CVE-2022-22965"}]}, {"type": "relationship", "id": "relationship--62356b82-94e4-45da-a92f-58340402f9c8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--068ef94b-36f8-4b9d-9065-ba4a60c9d9cd", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6a57df01-9e18-496a-a2ba-f26b2951f8a8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--068ef94b-36f8-4b9d-9065-ba4a60c9d9cd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--089176ee-3d78-46ac-8fe1-15b93b523645", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-42948", "description": "Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42948", "source_name": "cve", "external_id": "CVE-2022-42948"}]}, {"type": "relationship", "id": "relationship--3dd70cff-2510-4dda-9428-6186ced8799e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--089176ee-3d78-46ac-8fe1-15b93b523645", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--040f0bde-4a58-4ba8-b14f-06c56e52ca52", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--089176ee-3d78-46ac-8fe1-15b93b523645", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--edf56e15-ddb8-4c50-86d9-172cf5d9dee0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-39144", "description": "XStream Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39144", "source_name": "cve", "external_id": "CVE-2021-39144"}]}, {"type": "relationship", "id": "relationship--5eeeb61d-7407-4e07-91b1-e17def13d0b9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--edf56e15-ddb8-4c50-86d9-172cf5d9dee0", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--4eaea3a1-636f-4a98-b811-f418138b3c91", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--edf56e15-ddb8-4c50-86d9-172cf5d9dee0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-35394", "description": "Realtek Jungle SDK Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35394", "source_name": "cve", "external_id": "CVE-2021-35394"}]}, {"type": "relationship", "id": "relationship--a22ed869-31ea-4296-8b3f-6d9a32aedfe1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--0c10066e-e3a3-48e4-b3f4-c6e1a56930f0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--f2da7de6-a726-4b24-8276-b407abd7cab6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--f1951e8a-500e-4a26-8803-76d95c4554b4"}, {"type": "relationship", "id": "relationship--bafcaf3a-2d4d-4af1-ac2d-37a0eba0d18e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--14e37329-7ff5-48cc-b6ac-963f13869f7e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--e6c531b3-0a9d-4a20-9d10-5f7011d3c727", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--386e1156-bfb6-4f6a-96f2-778f258ac6dc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--115759bf-a5de-4675-b363-d909e1f38e55", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--d01e6d00-1ead-4ab6-a422-03c6d7146343", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-22204", "description": "ExifTool Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22204", "source_name": "cve", "external_id": "CVE-2021-22204"}]}, {"type": "relationship", "id": "relationship--f3719c6b-40f2-4967-a92f-49893461026f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d01e6d00-1ead-4ab6-a422-03c6d7146343", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2995d64d-fbb9-43e1-b6aa-18812011f7b0", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d01e6d00-1ead-4ab6-a422-03c6d7146343", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26500", "description": "Veeam Backup & Replication Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26500", "source_name": "cve", "external_id": "CVE-2022-26500"}]}, {"type": "relationship", "id": "relationship--2719a9c7-91c4-4844-9949-7a31b7d196f9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "relationship", "id": "relationship--227752ca-5ef8-45ce-bef0-c95b7f16069b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "target_ref": "attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0"}, {"type": "relationship", "id": "relationship--cfe0524b-5bcb-4d06-bcc8-2ae895210b1b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--4b493665-4655-402d-bae2-19ee6706e6a8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b2b23449-07ff-452c-b0c4-61c6f9ddf01d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6600207c-c41f-46a7-9f7d-43dd62e845ee", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--b54e78e8-cf4a-4b5c-a319-790b1da16a86", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26501", "description": "Veeam Backup & Replication Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26501", "source_name": "cve", "external_id": "CVE-2022-26501"}]}, {"type": "relationship", "id": "relationship--4dfe8548-ad59-41b2-b5cd-f8809d5548fc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b54e78e8-cf4a-4b5c-a319-790b1da16a86", "target_ref": "attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0"}, {"type": "relationship", "id": "relationship--e8a7796e-46f9-46b7-a6c0-ce8231252846", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b54e78e8-cf4a-4b5c-a319-790b1da16a86", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "relationship", "id": "relationship--255a19e5-5bd6-4d90-9092-368530b5dd90", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b54e78e8-cf4a-4b5c-a319-790b1da16a86", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--74f28a56-961f-4e3a-b0fd-78c03054394b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b54e78e8-cf4a-4b5c-a319-790b1da16a86", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-45382", "description": "D-Link Multiple Routers Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45382", "source_name": "cve", "external_id": "CVE-2021-45382"}]}, {"type": "relationship", "id": "relationship--bb8c55b3-31df-4423-abce-36e6395a49a2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--38eb0c22-6caf-46ce-8869-5964bd735858"}, {"type": "relationship", "id": "relationship--ff5d28cd-ddf5-45a2-902e-f8cfe489acce", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--355be19c-ffc9-46d5-8d50-d6a036c675b6"}, {"type": "relationship", "id": "relationship--3df66e9c-659e-4ab4-8f39-d567a8b97336", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--8e8e2e59-f46b-43ad-9a18-c47713ad96d2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "relationship", "id": "relationship--9ddf99a7-9f0d-4d15-8805-7470fa39170c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--db903564-6600-4dc3-acc5-777816ceea5c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f0c22463-9189-4be9-bc64-511ef388f2ef", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1b199bea-5599-45e1-a082-a4de0d62d0ed", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-26258", "description": "D-Link DIR-820L Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26258", "source_name": "cve", "external_id": "CVE-2022-26258"}]}, {"type": "relationship", "id": "relationship--4e0a758a-14da-4835-af9f-91d6ed86ac51", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1b199bea-5599-45e1-a082-a4de0d62d0ed", "target_ref": "attack-pattern--38eb0c22-6caf-46ce-8869-5964bd735858"}, {"type": "relationship", "id": "relationship--58477a2b-d087-4528-a6d8-62eee7adf421", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1b199bea-5599-45e1-a082-a4de0d62d0ed", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7c6233f2-3366-4ebb-aef2-da62b5afe781", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1b199bea-5599-45e1-a082-a4de0d62d0ed", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--fc3a4343-da18-4a36-83ae-299d046f928e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-34713", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34713", "source_name": "cve", "external_id": "CVE-2022-34713"}]}, {"type": "relationship", "id": "relationship--01e7f172-e7b8-4183-99b6-2544f6288c23", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fc3a4343-da18-4a36-83ae-299d046f928e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--98f4d23c-cd83-49e0-b1bb-8d3cf2c6bd20", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fc3a4343-da18-4a36-83ae-299d046f928e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--a2d7aec7-97ef-40a7-887d-0158a9755a8a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fc3a4343-da18-4a36-83ae-299d046f928e", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "vulnerability", "id": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-36884", "description": "Microsoft Windows Search Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36884", "source_name": "cve", "external_id": "CVE-2023-36884"}]}, {"type": "relationship", "id": "relationship--f1de7301-6654-43d1-ada5-457acca5e6b2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--33eb235b-a3cc-4d49-8c92-01761560a4e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--20fb2507-d71c-455d-9b6d-6104461cf26b"}, {"type": "relationship", "id": "relationship--aad2ab9f-782a-4e39-91e4-ef178ce67faf", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--f5d8eed6-48a9-4cdf-a3d7-d1ffa99c3d2a"}, {"type": "relationship", "id": "relationship--9d31289f-8db2-40f9-85e5-b00a6b790331", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--2fd38ae7-325d-4a36-acab-e52fca492a3a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--6495ae23-3ab4-43c5-a94f-5638a2c31fd2"}, {"type": "relationship", "id": "relationship--9e101220-1a89-4305-8521-238201633f30", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--7e7c2fba-7cca-486c-9582-4c1bb2851961"}, {"type": "relationship", "id": "relationship--d97b50db-7486-4653-bc5b-d14e4f10b619", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--68458e6d-99c0-4012-a5f3-a05d59700d35", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8f21d4e7-c01e-40db-b8a6-4273c41fe0ea", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "vulnerability", "id": "vulnerability--79838775-f790-45c8-abf9-e9366b8749b3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41128", "description": "Microsoft Windows Scripting Languages Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41128", "source_name": "cve", "external_id": "CVE-2022-41128"}]}, {"type": "relationship", "id": "relationship--044fe31f-f599-4671-93f4-f6eb80e8facb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--79838775-f790-45c8-abf9-e9366b8749b3", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "relationship", "id": "relationship--6b60141f-697b-4141-bb88-9e93b65ca897", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--79838775-f790-45c8-abf9-e9366b8749b3", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--6f3975e5-6540-42bd-8c82-59999d0b0ac5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--79838775-f790-45c8-abf9-e9366b8749b3", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "vulnerability", "id": "vulnerability--4cc57102-4371-410b-9494-2d41c6b8f278", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-42321", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42321", "source_name": "cve", "external_id": "CVE-2021-42321"}]}, {"type": "relationship", "id": "relationship--5d851a31-d7d7-496e-8a36-3feb8fcf8d62", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4cc57102-4371-410b-9494-2d41c6b8f278", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--89e28fa9-c8ab-4178-84cf-e1ca4c4e14fc", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4cc57102-4371-410b-9494-2d41c6b8f278", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-41082", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41082", "source_name": "cve", "external_id": "CVE-2022-41082"}]}, {"type": "relationship", "id": "relationship--f9354f2d-016c-4fdd-a0f7-7c794b64a275", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--40597f16-0963-4249-bf4c-ac93b7fb9807"}, {"type": "relationship", "id": "relationship--8a6b486b-90b8-452f-89c6-026b11b57dd2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--767dbf9e-df3f-45cb-8998-4903ab5f80c0"}, {"type": "relationship", "id": "relationship--456cfa8f-8352-488e-b3ba-fa620ba56d7b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--ea3070de-a819-46a0-b012-d1617d277c19", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--5b626d85-b67a-4acf-bb85-2c1326ef07fa", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--970a3432-3237-47ad-bcca-7d8cbb217736"}, {"type": "relationship", "id": "relationship--a57c1a4d-5ae9-4010-bdab-1f4c860e0b90", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--970a3432-3237-47ad-bcca-7d8cbb217736"}, {"type": "relationship", "id": "relationship--756e8aaa-8bd5-4698-a392-0e68800f754c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5961723a-e431-47a1-ae39-eb2f4521e2f1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--7b2eec0a-fb93-407c-96fc-540e7a4be62d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20867", "description": "VMware Tools Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20867", "source_name": "cve", "external_id": "CVE-2023-20867"}]}, {"type": "relationship", "id": "relationship--d8be6489-d237-49f0-b00f-63f850e81e21", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7b2eec0a-fb93-407c-96fc-540e7a4be62d", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--e63ef361-ed15-440a-b6d9-9dbe495d91e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7b2eec0a-fb93-407c-96fc-540e7a4be62d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--8c25b226-9194-45ac-8e96-ea9f70e2e90e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7b2eec0a-fb93-407c-96fc-540e7a4be62d", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--4bc51355-123b-4290-84f6-b46d1656204c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22963", "description": "VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22963", "source_name": "cve", "external_id": "CVE-2022-22963"}]}, {"type": "relationship", "id": "relationship--bf4f0cbb-c3ed-4e2f-a09e-b82ff5dc9454", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4bc51355-123b-4290-84f6-b46d1656204c", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--54c862aa-baa0-4090-8bc3-45ffab6ba879", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4bc51355-123b-4290-84f6-b46d1656204c", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--bf18bb63-55be-4502-a0ab-cd36b1b26656", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4bc51355-123b-4290-84f6-b46d1656204c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--d7d633d4-7cba-4c75-a02f-72c64dd41259", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-20887", "description": "Vmware Aria Operations for Networks Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20887", "source_name": "cve", "external_id": "CVE-2023-20887"}]}, {"type": "relationship", "id": "relationship--e53d5d8f-03a4-42be-a1a8-356bc92e9bc8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d7d633d4-7cba-4c75-a02f-72c64dd41259", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3fdfdc85-e8c5-4c8b-8a46-dce7b7c29b03", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d7d633d4-7cba-4c75-a02f-72c64dd41259", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-38035", "description": "Ivanti Sentry Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38035", "source_name": "cve", "external_id": "CVE-2023-38035"}]}, {"type": "relationship", "id": "relationship--fd3e3d90-391e-4e41-99e8-fc706ad3961c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--9e42389d-080f-4236-b1ec-6b1930ff8b83", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--b18eae87-b469-4e14-b454-b171b416bc18"}, {"type": "relationship", "id": "relationship--3e84140c-443f-4040-8444-7e33cb7b7d1f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--9147b219-4aef-46b7-a20a-71bca476a056", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--13361372-b644-42e2-9a25-29755ef1af7d", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--e358d692-23c0-4a31-9eb6-ecc13a8d7735"}, {"type": "relationship", "id": "relationship--74228a2a-06be-491b-b326-9b9d1cc8663b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--18e39b3f-a948-4754-9ee5-780b33cbe5d6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--650c784b-7504-4df7-ab2c-4ea882384d1e"}, {"type": "relationship", "id": "relationship--039c1a4b-bd03-4273-b116-46ec26641cf8", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--567860ac-3385-4271-9468-d726630e623b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1dbea114-d94e-45cc-bb2d-af80fc3d11f6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--c64f2b10-1fb0-42e3-b50d-21298bfe653c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-22947", "description": "VMware Spring Cloud Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22947", "source_name": "cve", "external_id": "CVE-2022-22947"}]}, {"type": "relationship", "id": "relationship--af73006a-abf8-4d59-86ce-e25e9374e98e", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c64f2b10-1fb0-42e3-b50d-21298bfe653c", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--4755b7bc-6b42-4a91-bf3d-48c24a921b22", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c64f2b10-1fb0-42e3-b50d-21298bfe653c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b99bb120-b459-4f9d-b14d-19b77ed82d3a", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c64f2b10-1fb0-42e3-b50d-21298bfe653c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--cecea028-2fbf-4bc1-bac3-c9e7eac29e31", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-5217", "description": "Google Chromium libvpx Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217", "source_name": "cve", "external_id": "CVE-2023-5217"}]}, {"type": "relationship", "id": "relationship--725c6f75-fa33-4172-836d-41d52367f873", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cecea028-2fbf-4bc1-bac3-c9e7eac29e31", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--4ae1a089-82de-4a29-b7b3-e612bbec188f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cecea028-2fbf-4bc1-bac3-c9e7eac29e31", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--f3a0a25d-5cef-4255-b19f-7b010b8d5b10", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-3038", "description": "Google Chromium Network Service Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3038", "source_name": "cve", "external_id": "CVE-2022-3038"}]}, {"type": "relationship", "id": "relationship--49ed45c2-dcb0-4fbf-afec-5bd569ab96d4", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f3a0a25d-5cef-4255-b19f-7b010b8d5b10", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--502a2ee2-79e2-4573-b310-26b16082d2d9", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3a0a25d-5cef-4255-b19f-7b010b8d5b10", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--7d14be3f-7df9-4fdb-b02d-4417e6161b4b", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-7024", "description": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7024", "source_name": "cve", "external_id": "CVE-2023-7024"}]}, {"type": "relationship", "id": "relationship--d575866a-2b0e-4f3b-94c4-7e23182fec98", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7d14be3f-7df9-4fdb-b02d-4417e6161b4b", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--bfcf1f15-75b4-417a-8cfb-73a2038b4093", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7d14be3f-7df9-4fdb-b02d-4417e6161b4b", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--2d894e4d-b788-4b4f-b620-93bdff268fbb", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-29464", "description": "WSO2 Multiple Products Unrestrictive Upload of File Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29464", "source_name": "cve", "external_id": "CVE-2022-29464"}]}, {"type": "relationship", "id": "relationship--bbf31e50-9a1a-4bfc-9f08-b30b769b3d34", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2d894e4d-b788-4b4f-b620-93bdff268fbb", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--81886fad-764c-4add-af53-3aae20bf22e3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2d894e4d-b788-4b4f-b620-93bdff268fbb", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--0be4357b-7740-4c99-b249-14309a49af97", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2d894e4d-b788-4b4f-b620-93bdff268fbb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--5b0a0ba5-6158-4f3c-b926-8e61b555c3ec", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-39226", "description": "Grafana Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39226", "source_name": "cve", "external_id": "CVE-2021-39226"}]}, {"type": "relationship", "id": "relationship--cfc752c0-c4cd-4f0a-aedc-5bffc351a1f7", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5b0a0ba5-6158-4f3c-b926-8e61b555c3ec", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--3a9055ad-9fd2-4d39-b55d-d23e9167c969", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5b0a0ba5-6158-4f3c-b926-8e61b555c3ec", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--403acac5-abcc-4021-82f1-27d8510d6d24", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-31166", "description": "Microsoft HTTP Protocol Stack Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31166", "source_name": "cve", "external_id": "CVE-2021-31166"}]}, {"type": "relationship", "id": "relationship--5cd317bc-5f61-4d2d-9c67-f77217a274af", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--403acac5-abcc-4021-82f1-27d8510d6d24", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--435a669a-f894-4500-810b-b19f7172937c", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--403acac5-abcc-4021-82f1-27d8510d6d24", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--87dd5dfb-2f8c-4a0d-9263-7149a135b03f", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-21971", "description": "Microsoft Windows Runtime Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21971", "source_name": "cve", "external_id": "CVE-2022-21971"}]}, {"type": "relationship", "id": "relationship--3378dcf1-60cf-49f7-a39b-985e5e4bd046", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--87dd5dfb-2f8c-4a0d-9263-7149a135b03f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7c69bf2a-833a-4504-bc74-a3ff00e4e137", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--87dd5dfb-2f8c-4a0d-9263-7149a135b03f", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--d2587a81-9f72-4674-9487-3ab2304ce065", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2021-21975", "description": "VMware Server Side Request Forgery in vRealize Operations Manager API", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21975", "source_name": "cve", "external_id": "CVE-2021-21975"}]}, {"type": "relationship", "id": "relationship--666b7a9e-48f7-4683-b672-e3a099123dd2", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d2587a81-9f72-4674-9487-3ab2304ce065", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--1b6023bb-8d6b-40b8-97d0-a68ad483d979", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2022-3075", "description": "Google Chromium Mojo Insufficient Data Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3075", "source_name": "cve", "external_id": "CVE-2022-3075"}]}, {"type": "relationship", "id": "relationship--f031c0b7-1d38-4aad-b6f5-da5536c33963", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1b6023bb-8d6b-40b8-97d0-a68ad483d979", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--ccf1d0c6-d0f6-4040-9b30-761f7c4bdd57", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2023-2136", "description": "Google Chrome Skia Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2136", "source_name": "cve", "external_id": "CVE-2023-2136"}]}, {"type": "relationship", "id": "relationship--326b77d5-7f3b-4baf-b6fc-05f237b8bba6", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ccf1d0c6-d0f6-4040-9b30-761f7c4bdd57", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--24d468ba-8c01-4f26-88fb-ce0966544860", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "name": "CVE-2012-0754", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", "source_name": "cve", "external_id": "CVE-2012-0754"}]}, {"type": "relationship", "id": "relationship--87ae3393-b35e-4990-bfdf-4ac726faeaf3", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--24d468ba-8c01-4f26-88fb-ce0966544860", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--b885d16c-1727-46c3-b9a5-a848f0208ec5", "spec_version": "2.1", "created": "2026-03-02T15:44:10.351846Z", "modified": "2026-03-02T15:44:10.351846Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--24d468ba-8c01-4f26-88fb-ce0966544860", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}]}