{"type": "bundle", "id": "bundle--b699ac14-afa4-4cae-a8dc-e884317757ac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "objects": [{"type": "vulnerability", "id": "vulnerability--9e31676c-1499-41d8-ad23-9eafa379e36a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-34102", "description": "Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34102", "source_name": "cve", "external_id": "CVE-2024-34102"}]}, {"type": "relationship", "id": "relationship--48ab2e82-6517-4bbf-97fa-dd683f0437d9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9e31676c-1499-41d8-ad23-9eafa379e36a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6406d65e-81af-42c4-a46c-e4fd6d8358c3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9e31676c-1499-41d8-ad23-9eafa379e36a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--fb58d826-97bd-4bae-bec1-2a7f1827f3c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9e31676c-1499-41d8-ad23-9eafa379e36a", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-13608", "description": "Citrix StoreFront Server XML External Entity (XXE) Processing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13608", "source_name": "cve", "external_id": "CVE-2019-13608"}]}, {"type": "relationship", "id": "relationship--221041bd-e78b-4ce1-9899-296d0fc7af32", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--e7f2c46b-f1e3-47cf-b924-a7e343ce8fe2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f2104813-ae1e-4847-bdae-5dda8d6c7d13", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--0d8b072d-f091-448a-94e7-da408aaeaf3e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--2db1a906-deca-4829-9ae7-cac0dfa76941", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c779cf48-2b72-46bc-a869-7a00125c2785", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--90b3f4e5-17d2-40c0-be25-060f8aec5c67", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4671", "description": "Google Chromium Visuals Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4671", "source_name": "cve", "external_id": "CVE-2024-4671"}]}, {"type": "relationship", "id": "relationship--a3a2d022-1e72-4844-943f-d43979416342", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--90b3f4e5-17d2-40c0-be25-060f8aec5c67", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--42d9f876-4e55-44ba-90de-afe31d98de55", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--90b3f4e5-17d2-40c0-be25-060f8aec5c67", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--90d29286-7657-47d9-b553-e60bf27b168e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-21608", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21608", "source_name": "cve", "external_id": "CVE-2023-21608"}]}, {"type": "relationship", "id": "relationship--c3df75f9-334a-43ca-8a2d-e4f7afa194ea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--90d29286-7657-47d9-b553-e60bf27b168e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--614fa05e-3067-44cb-af70-ecd82691fc7d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--90d29286-7657-47d9-b553-e60bf27b168e", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--cf69fa92-1b31-4e62-b8bb-f2e0fcc44dbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-3038", "description": "Google Chromium Network Service Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3038", "source_name": "cve", "external_id": "CVE-2022-3038"}]}, {"type": "relationship", "id": "relationship--fdf239bf-e6f8-45dd-80d2-ca698b7bdf8c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cf69fa92-1b31-4e62-b8bb-f2e0fcc44dbe", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--c6d8f9a6-f161-4016-b84b-4f6f1ed6d3da", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cf69fa92-1b31-4e62-b8bb-f2e0fcc44dbe", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--d1918178-7d5b-4fe4-914e-e572bed9f609", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-37975", "description": "Google Chromium V8 Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37975", "source_name": "cve", "external_id": "CVE-2021-37975"}]}, {"type": "relationship", "id": "relationship--e3aafc33-89c6-47f0-abe5-80a055b7c4ca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d1918178-7d5b-4fe4-914e-e572bed9f609", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--7be03f42-d77a-47e8-a410-5d9775dbda6b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d1918178-7d5b-4fe4-914e-e572bed9f609", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--7c9b1c15-29c0-4d85-9c2f-3d9d254ad1fc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-30554", "description": "Google Chromium WebGL Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30554", "source_name": "cve", "external_id": "CVE-2021-30554"}]}, {"type": "relationship", "id": "relationship--c82edc1b-4143-4f44-a387-f7842785218f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7c9b1c15-29c0-4d85-9c2f-3d9d254ad1fc", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--4e1eccd9-944b-4976-809b-c8ab6d87ced1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7c9b1c15-29c0-4d85-9c2f-3d9d254ad1fc", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--41ccc619-cce4-486d-96bd-ddffe3328a9f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-29256", "description": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29256", "source_name": "cve", "external_id": "CVE-2021-29256"}]}, {"type": "relationship", "id": "relationship--dba23133-46b9-41e9-949b-ca6916e1aa87", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--41ccc619-cce4-486d-96bd-ddffe3328a9f", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--fb8bdd24-0524-4806-a967-3372883518b2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--41ccc619-cce4-486d-96bd-ddffe3328a9f", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--ab72cbf4-6afc-4dc8-8633-0be4816dcf92", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--41ccc619-cce4-486d-96bd-ddffe3328a9f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--f6798d97-d7a3-42a2-bda0-ef4b771bf985", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-28550", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28550", "source_name": "cve", "external_id": "CVE-2021-28550"}]}, {"type": "relationship", "id": "relationship--36fd41cb-502c-41b0-a7f2-57a3ecdcf244", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f6798d97-d7a3-42a2-bda0-ef4b771bf985", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--27e838ff-1c2a-4f9e-89d0-581fe8e36d9c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22893", "description": "Ivanti Pulse Connect Secure Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22893", "source_name": "cve", "external_id": "CVE-2021-22893"}]}, {"type": "relationship", "id": "relationship--cf9168f4-f6d3-41fd-a2e9-6a1462c89308", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27e838ff-1c2a-4f9e-89d0-581fe8e36d9c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c6a0f2b1-50a2-4e43-a733-a230fea79f54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27e838ff-1c2a-4f9e-89d0-581fe8e36d9c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--4e2ebd50-df8c-46b4-9ee2-fd67369dcceb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27e838ff-1c2a-4f9e-89d0-581fe8e36d9c", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--b840463f-cc1b-4cb2-bf5d-8a0fc386f854", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21206", "description": "Google Chromium Blink Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21206", "source_name": "cve", "external_id": "CVE-2021-21206"}]}, {"type": "relationship", "id": "relationship--7eec80a2-e23a-4727-a198-bbc5317a9769", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b840463f-cc1b-4cb2-bf5d-8a0fc386f854", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--650d3b22-4310-407a-b619-318a260662e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b840463f-cc1b-4cb2-bf5d-8a0fc386f854", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--db43d584-9733-4be3-88bc-0aeb86358496", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-4878", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4878", "source_name": "cve", "external_id": "CVE-2018-4878"}]}, {"type": "relationship", "id": "relationship--c7657c16-1e81-4a45-9fcd-76929775816a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--db43d584-9733-4be3-88bc-0aeb86358496", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--bc62c71a-051a-4416-a68e-6cf327e63d59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--db43d584-9733-4be3-88bc-0aeb86358496", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--d8751dc6-98fa-47e3-8b0d-8544ad2f8476", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--db43d584-9733-4be3-88bc-0aeb86358496", "target_ref": "attack-pattern--4061e78c-1284-44b4-9116-73e4ac3912f7"}, {"type": "vulnerability", "id": "vulnerability--f3a98069-483a-45e7-91d0-7535da5c79b5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-15982", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15982", "source_name": "cve", "external_id": "CVE-2018-15982"}]}, {"type": "relationship", "id": "relationship--2fc3d41b-c160-4c9f-8fc5-3988015483e0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3a98069-483a-45e7-91d0-7535da5c79b5", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--3de5c2b1-807f-483b-b5a3-414856fd0a23", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f3a98069-483a-45e7-91d0-7535da5c79b5", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--4d90de3e-8e90-4a7f-8d1e-7ab476b9fb61", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-7855", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7855", "source_name": "cve", "external_id": "CVE-2016-7855"}]}, {"type": "relationship", "id": "relationship--d80c476f-adaf-420a-9ce4-a647bccdabc2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4d90de3e-8e90-4a7f-8d1e-7ab476b9fb61", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--361f7552-24b8-4eda-9a18-713e6f5d697e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-0984", "description": "Adobe Flash Player and AIR Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0984", "source_name": "cve", "external_id": "CVE-2016-0984"}]}, {"type": "relationship", "id": "relationship--5d74e5e6-4d4f-45a9-9f90-80c27186810f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--361f7552-24b8-4eda-9a18-713e6f5d697e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--aeb52a35-44a5-4b91-b6b0-6174241a46b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--361f7552-24b8-4eda-9a18-713e6f5d697e", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-5119", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5119", "source_name": "cve", "external_id": "CVE-2015-5119"}]}, {"type": "relationship", "id": "relationship--eff5b224-c817-4047-a886-b71e4e5fa4d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--abfdd7fc-8a85-40ba-b939-59d54588de06", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--eb1de569-3ec8-43f8-8b00-2609b9e6af63", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--f4599aa0-4f85-4a32-80ea-fc39dc965945"}, {"type": "relationship", "id": "relationship--b9c6e7c4-cd85-4b5c-b20a-418a1da908a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--dd337ca0-d60a-469f-bc4a-6c134da54f95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "relationship", "id": "relationship--f9d766c6-34fb-4270-af13-8f16a92fe696", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--9e54b959-aab4-46cd-8bc2-3dea7828e007", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78b96a5c-b97a-4e10-8ef3-f4e1436a9dda", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "vulnerability", "id": "vulnerability--87454854-6932-41ce-9226-b988d6014e74", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-0313", "description": "Adobe Flash Player Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0313", "source_name": "cve", "external_id": "CVE-2015-0313"}]}, {"type": "relationship", "id": "relationship--41487b95-729c-4a9b-ab94-6e2dd5bac776", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--87454854-6932-41ce-9226-b988d6014e74", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--72c03eb5-9b5b-41e0-a0d6-12a9e2eaa1cf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2014-0496", "description": "Adobe Reader and Acrobat Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0496", "source_name": "cve", "external_id": "CVE-2014-0496"}]}, {"type": "relationship", "id": "relationship--58d583c2-179e-4969-934a-655611da8fa5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--72c03eb5-9b5b-41e0-a0d6-12a9e2eaa1cf", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--d6894b03-627f-4fbc-b8c8-c957a6ec824e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2009-4324", "description": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4324", "source_name": "cve", "external_id": "CVE-2009-4324"}]}, {"type": "relationship", "id": "relationship--92cb569e-7116-4db8-9640-e80eb44fab26", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d6894b03-627f-4fbc-b8c8-c957a6ec824e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--f7985fc8-a308-4eb1-a143-aece645d15e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d6894b03-627f-4fbc-b8c8-c957a6ec824e", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "vulnerability", "id": "vulnerability--0f34f3ee-75cf-4e51-aae3-af4c203fc2d4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-27038", "description": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27038", "source_name": "cve", "external_id": "CVE-2025-27038"}]}, {"type": "relationship", "id": "relationship--1a7c3152-5345-43d0-be5d-3b9aa910510f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0f34f3ee-75cf-4e51-aae3-af4c203fc2d4", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--22f2fcce-6ec0-4d74-b23b-964a8544047f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0f34f3ee-75cf-4e51-aae3-af4c203fc2d4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--7d6c112b-e32f-46dd-a108-c31c535d6527", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21335", "description": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21335", "source_name": "cve", "external_id": "CVE-2025-21335"}]}, {"type": "relationship", "id": "relationship--ac55b132-3c3d-4044-9272-62a81a21efe5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7d6c112b-e32f-46dd-a108-c31c535d6527", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--64e17fc9-1fc0-4b10-9384-95a37b8c9573", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7d6c112b-e32f-46dd-a108-c31c535d6527", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--7d3e105e-ce35-4c68-af09-b25bc5fcad36", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21334", "description": "Microsoft Windows Hyper-V NT Kernel Integration VSP Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21334", "source_name": "cve", "external_id": "CVE-2025-21334"}]}, {"type": "relationship", "id": "relationship--d83fef6d-e0b4-4c14-a6cb-ff0b2bc2ae85", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7d3e105e-ce35-4c68-af09-b25bc5fcad36", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--e76578e3-f363-4ed5-9f91-a2c7a9370251", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7d3e105e-ce35-4c68-af09-b25bc5fcad36", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--ce05fd43-c697-41a3-a7a3-352bfebaf685", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24085", "description": "Apple Multiple Products Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24085", "source_name": "cve", "external_id": "CVE-2025-24085"}]}, {"type": "relationship", "id": "relationship--b339ee6a-73c8-42a2-85f6-fa0bc8f95c8c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ce05fd43-c697-41a3-a7a3-352bfebaf685", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--edc5d610-5572-4777-8298-8c917c951f1d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ce05fd43-c697-41a3-a7a3-352bfebaf685", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-32709", "description": "Microsoft Windows Ancillary Function Driver for WinSock Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32709", "source_name": "cve", "external_id": "CVE-2025-32709"}]}, {"type": "relationship", "id": "relationship--0a808e8e-5154-4c5c-94ff-62f74bd0bbcb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--9721c118-5969-4873-892b-70d6075a7026", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--31902b9f-351a-46ca-b552-5df4c184b10f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--926a69cd-cbd9-48de-a126-36ca227931ca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--d0a0ab24-e23d-4a8d-bf53-4948a0cc5b7e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--78478006-fbc6-4260-8aa1-0e46947d45b4", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-32701", "description": "Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32701", "source_name": "cve", "external_id": "CVE-2025-32701"}]}, {"type": "relationship", "id": "relationship--d4b1bb93-9a89-4280-9019-261b8b178fa5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--995fd772-07d6-4cc3-a075-3852e608ec2f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ce459ae2-0574-48b4-93d9-8db80abb6373", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--0069d0ac-ff55-4b42-80fb-5eebb5adc6c9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "target_ref": "attack-pattern--65f2d882-3f41-4d48-8a06-29af77ec9f90"}, {"type": "relationship", "id": "relationship--e7289ee2-aea7-428d-86d4-10476b528abe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--85c3db8e-c2d8-49d4-9139-611d861de8b3", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "vulnerability", "id": "vulnerability--160a79a7-2dca-4e5b-8800-40441fa28f8f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-30400", "description": "Microsoft Windows DWM Core Library Use-After-Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30400", "source_name": "cve", "external_id": "CVE-2025-30400"}]}, {"type": "relationship", "id": "relationship--f005e8ef-0dcd-4a6f-a055-b26827f5e969", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--160a79a7-2dca-4e5b-8800-40441fa28f8f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--1780e3cf-2031-4ea8-aca0-4517837581a3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--160a79a7-2dca-4e5b-8800-40441fa28f8f", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "vulnerability", "id": "vulnerability--62a91405-2397-4071-8681-c3d8900ebfcf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-29464", "description": "WSO2 Multiple Products Unrestrictive Upload of File Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29464", "source_name": "cve", "external_id": "CVE-2022-29464"}]}, {"type": "relationship", "id": "relationship--d8fcc7e6-a737-4596-8296-9da2cbeb3513", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--62a91405-2397-4071-8681-c3d8900ebfcf", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ff3888d3-8b51-4c5e-a0ac-8ad5e6806d94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--62a91405-2397-4071-8681-c3d8900ebfcf", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--e91d16fe-220a-46ab-bfb2-d6ba5b95fdfa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--62a91405-2397-4071-8681-c3d8900ebfcf", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "vulnerability", "id": "vulnerability--3823d602-fba7-4775-980d-19bc1cdbbcc2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-3129", "description": "Laravel Ignition File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3129", "source_name": "cve", "external_id": "CVE-2021-3129"}]}, {"type": "relationship", "id": "relationship--0dd0b3c2-88fa-47bb-883f-27de318fd871", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3823d602-fba7-4775-980d-19bc1cdbbcc2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--29e4d7dc-a52c-4aff-9784-1eda38f3cabd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3823d602-fba7-4775-980d-19bc1cdbbcc2", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--daf49a7c-4b7c-410b-9966-a3b0a8f253a7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27860", "description": "FatPipe WARP, IPVPN, and MPVPN Configuration Upload exploit", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27860", "source_name": "cve", "external_id": "CVE-2021-27860"}]}, {"type": "relationship", "id": "relationship--ae60f7bd-14bd-4268-bbb3-dc93602b3f41", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--daf49a7c-4b7c-410b-9966-a3b0a8f253a7", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b265bcc3-732b-4e1d-85ba-6b74a220be13", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--daf49a7c-4b7c-410b-9966-a3b0a8f253a7", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--15562c97-1fd3-422f-af86-a472d9249a20", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22900", "description": "Ivanti Pulse Connect Secure Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22900", "source_name": "cve", "external_id": "CVE-2021-22900"}]}, {"type": "relationship", "id": "relationship--3d2b122b-bc06-4c08-a604-d152fdf2330b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--15562c97-1fd3-422f-af86-a472d9249a20", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cee648cb-c864-4999-9687-c8e0b0fea750", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--15562c97-1fd3-422f-af86-a472d9249a20", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--d6b38204-86fb-44f0-9053-619799546b80", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22005", "description": "VMware vCenter Server File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22005", "source_name": "cve", "external_id": "CVE-2021-22005"}]}, {"type": "relationship", "id": "relationship--a81c2b6b-2ddc-4899-92c1-5cc1c8d7fdc5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d6b38204-86fb-44f0-9053-619799546b80", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6b197c52-fd80-42e6-9a5c-75fdcbb445aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d6b38204-86fb-44f0-9053-619799546b80", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9423083d-48f8-4638-ae38-4c9280c8e721", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-15961", "description": "Adobe ColdFusion Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15961", "source_name": "cve", "external_id": "CVE-2018-15961"}]}, {"type": "relationship", "id": "relationship--0fb77744-2cc1-4eed-947b-6c6c85eb7729", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9423083d-48f8-4638-ae38-4c9280c8e721", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--72f5d0e8-e023-4683-8db4-a10ef863b8f3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9423083d-48f8-4638-ae38-4c9280c8e721", "target_ref": "attack-pattern--0cfe31a7-81fc-472c-bc45-e2808d1066a3"}, {"type": "vulnerability", "id": "vulnerability--46717812-f0a5-42cd-a722-3a11698c9844", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-57968", "description": "Advantive VeraCore Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57968", "source_name": "cve", "external_id": "CVE-2024-57968"}]}, {"type": "relationship", "id": "relationship--7b70b580-fa9c-4e04-9a13-4778ac23f0f5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--46717812-f0a5-42cd-a722-3a11698c9844", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--010b8786-e1cb-4f81-9ad1-7cf241e41061", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--46717812-f0a5-42cd-a722-3a11698c9844", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--91fde121-68ef-404b-8e78-d72304fd566a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-31324", "description": "SAP NetWeaver Unrestricted File Upload Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31324", "source_name": "cve", "external_id": "CVE-2025-31324"}]}, {"type": "relationship", "id": "relationship--53ae9f36-4ed5-4eaa-818c-7cf21730bca2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--91fde121-68ef-404b-8e78-d72304fd566a", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--8bf7af5d-36d3-413e-94a4-aa2b581ab512", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--91fde121-68ef-404b-8e78-d72304fd566a", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--45ed2584-b61c-40ae-ad25-31f77550a70c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--91fde121-68ef-404b-8e78-d72304fd566a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--aeee6c9e-a359-402e-a6b3-c9dcc59e4f5a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--91fde121-68ef-404b-8e78-d72304fd566a", "target_ref": "attack-pattern--0ad7bc5c-235a-4048-944b-3b286676cb74"}, {"type": "vulnerability", "id": "vulnerability--441f54ce-900c-49e0-8c13-50c5e8e54755", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-5274", "description": "Google Chromium V8 Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5274", "source_name": "cve", "external_id": "CVE-2024-5274"}]}, {"type": "relationship", "id": "relationship--fdd89586-0409-4ceb-b62f-1f1d7ce5bd47", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--441f54ce-900c-49e0-8c13-50c5e8e54755", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--7a21d1e2-48c7-4714-8cc3-55169263c1ab", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--441f54ce-900c-49e0-8c13-50c5e8e54755", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--e1a90e4b-38a5-48ce-9ee6-51b135613143", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4947", "description": "Google Chromium V8 Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4947", "source_name": "cve", "external_id": "CVE-2024-4947"}]}, {"type": "relationship", "id": "relationship--c3436cd1-9770-4ac0-98ad-fa97da517328", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e1a90e4b-38a5-48ce-9ee6-51b135613143", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f32af2da-54f4-4e25-bbf2-fb3f3e0c1178", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e1a90e4b-38a5-48ce-9ee6-51b135613143", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--2320d732-152b-4590-b97a-2554bc07bb21", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-11292", "description": "Adobe Flash Player Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11292", "source_name": "cve", "external_id": "CVE-2017-11292"}]}, {"type": "relationship", "id": "relationship--17008140-b562-4278-a1a9-dc62257285f2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2320d732-152b-4590-b97a-2554bc07bb21", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--020195da-6c77-4270-a7f3-7ed5e8fade7b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2320d732-152b-4590-b97a-2554bc07bb21", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--e88f5889-4c50-460c-93a6-0490fe8809fb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2320d732-152b-4590-b97a-2554bc07bb21", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--94b1f401-025b-4aa9-b5de-59d8294fe4a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2320d732-152b-4590-b97a-2554bc07bb21", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--234170ae-31e9-4d32-954c-160263a1ff6a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-6554", "description": "Google Chromium V8 Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6554", "source_name": "cve", "external_id": "CVE-2025-6554"}]}, {"type": "relationship", "id": "relationship--dedbb03f-c8a2-4712-8cce-312c9ff374a7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--234170ae-31e9-4d32-954c-160263a1ff6a", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--7ff5806d-6e1f-4336-8ac2-9219d2f3dde1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--234170ae-31e9-4d32-954c-160263a1ff6a", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--0a0c3094-683a-4288-a99a-4926060c1f47", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--234170ae-31e9-4d32-954c-160263a1ff6a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--13e25afe-9d65-410f-9ab4-63cff2d13e26", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-30397", "description": "Microsoft Windows Scripting Engine Type Confusion Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30397", "source_name": "cve", "external_id": "CVE-2025-30397"}]}, {"type": "relationship", "id": "relationship--fd78455f-e715-4f55-9c2d-f07e41797bc7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--13e25afe-9d65-410f-9ab4-63cff2d13e26", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--e1834dc8-4544-40df-8f6d-59f617c7119c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--13e25afe-9d65-410f-9ab4-63cff2d13e26", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--6c480d3e-6ace-4786-9b24-2e28d26868ce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-48788", "description": "Fortinet FortiClient EMS SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48788", "source_name": "cve", "external_id": "CVE-2023-48788"}]}, {"type": "relationship", "id": "relationship--692ce6b8-1f82-4c45-9b9a-7e0ee784d5d3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6c480d3e-6ace-4786-9b24-2e28d26868ce", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--151a1a4c-5a04-4a64-bdf5-057ab9ac80ac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6c480d3e-6ace-4786-9b24-2e28d26868ce", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2a79b3f9-c9fb-46cb-8a19-fca830ac28af", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6c480d3e-6ace-4786-9b24-2e28d26868ce", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-34362", "description": "Progress MOVEit Transfer SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34362", "source_name": "cve", "external_id": "CVE-2023-34362"}]}, {"type": "relationship", "id": "relationship--61ad12fd-c217-478a-8006-872c40674572", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--df4e3b7a-7081-4753-8f2d-f6d1830d24d3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6348ec41-be1e-4bca-aa02-52ed98bed6ad", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--b24e2a20-3b3d-4bf0-823b-1ed765398fb0"}, {"type": "relationship", "id": "relationship--f5a9ec7e-37df-4f64-8ea7-187f1388e8c0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--18478374-feec-4ada-9538-481f2e645dd1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--17471ca2-bf3a-4dd8-81d5-c64c7e67758e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--5b338c37-1da5-416d-a557-9fd59ec20fea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--90d645b9-2408-42db-8921-a561ca0f43d5", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--f7e25b34-4875-4947-b502-3261c9134aa1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-42258", "description": "BQE BillQuick Web Suite SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42258", "source_name": "cve", "external_id": "CVE-2021-42258"}]}, {"type": "relationship", "id": "relationship--f8b22646-038e-49a6-986d-7990b305aae4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f7e25b34-4875-4947-b502-3261c9134aa1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--00a63ce9-f719-4c0f-b0d8-c97de6a3098d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f7e25b34-4875-4947-b502-3261c9134aa1", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "vulnerability", "id": "vulnerability--fa20e273-8605-429c-ac43-d870a37974f5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27101", "description": "Accellion FTA SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27101", "source_name": "cve", "external_id": "CVE-2021-27101"}]}, {"type": "relationship", "id": "relationship--a896bbe0-528c-4bd1-81cc-0e3e9b99429a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa20e273-8605-429c-ac43-d870a37974f5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0e3d4464-91b9-4197-9335-77d5afad6789", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fa20e273-8605-429c-ac43-d870a37974f5", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-25257", "description": "Fortinet FortiWeb SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25257", "source_name": "cve", "external_id": "CVE-2025-25257"}]}, {"type": "relationship", "id": "relationship--3151c0ec-d87e-4c67-9ff9-9ebd54258ed3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--356c90d8-83f0-4d13-98ae-91accf159eec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--14b1497e-fe61-439f-b59d-42b09acbd176", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--96c5622a-508d-4493-8f8f-6d6469524d01", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--8ae3e37f-99b0-4821-88ad-3fcafbc29e5f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8e161430-be8f-41a3-84a8-939652e0d3eb", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "vulnerability", "id": "vulnerability--40057a55-f2bb-490b-bba7-fdb65f58c141", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-25181", "description": " Advantive VeraCore SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25181", "source_name": "cve", "external_id": "CVE-2025-25181"}]}, {"type": "relationship", "id": "relationship--d7c39868-41cb-42d1-bb0b-4c06d2e67a54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--40057a55-f2bb-490b-bba7-fdb65f58c141", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--2e00d416-d157-4074-ab54-ac5d7754b6df", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--40057a55-f2bb-490b-bba7-fdb65f58c141", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--1e39c649-00ca-4e9c-8910-54a40c844c53", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--40057a55-f2bb-490b-bba7-fdb65f58c141", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "vulnerability", "id": "vulnerability--06a1a5a8-87c9-4f61-9ab6-c796f004d984", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-29574", "description": "CyberoamOS (CROS) SQL Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29574", "source_name": "cve", "external_id": "CVE-2020-29574"}]}, {"type": "relationship", "id": "relationship--f06fe5a5-ccb4-4ad1-ba96-410ee74f4466", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--06a1a5a8-87c9-4f61-9ab6-c796f004d984", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--838cafa0-f4fb-4c71-b471-fb261ee5757f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--06a1a5a8-87c9-4f61-9ab6-c796f004d984", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4133d38e-b972-4fff-8eb7-7b018657454c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-38112", "description": "Microsoft Windows MSHTML Platform Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38112", "source_name": "cve", "external_id": "CVE-2024-38112"}]}, {"type": "relationship", "id": "relationship--4805f7d8-8f32-49fa-9aad-10363ccc6c70", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4133d38e-b972-4fff-8eb7-7b018657454c", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--25eeeff1-c80c-46e2-ba64-219a3beb6338", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4133d38e-b972-4fff-8eb7-7b018657454c", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--20edaffc-5552-41c0-b911-8222ec0ff2bd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24054", "description": "Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24054", "source_name": "cve", "external_id": "CVE-2025-24054"}]}, {"type": "relationship", "id": "relationship--0668c59b-64a3-41cf-8665-25e47754f866", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--20edaffc-5552-41c0-b911-8222ec0ff2bd", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--2475cfd9-9763-4c0d-b14f-08b42f32fb7c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--20edaffc-5552-41c0-b911-8222ec0ff2bd", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "vulnerability", "id": "vulnerability--ce9d4162-c615-4041-8082-ae14a74b3d40", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-21893", "description": "Ivanti Connect Secure, Policy Secure, and Neurons Server-Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21893", "source_name": "cve", "external_id": "CVE-2024-21893"}]}, {"type": "relationship", "id": "relationship--792b5a44-e053-4192-abd3-1f4849b60d68", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ce9d4162-c615-4041-8082-ae14a74b3d40", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7cf60a8e-73c9-4f5b-a68e-b7821d828dc4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ce9d4162-c615-4041-8082-ae14a74b3d40", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--986f305e-bca9-4829-9af7-e2aaab7bf669", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ce9d4162-c615-4041-8082-ae14a74b3d40", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--38caeb8e-7c2c-411c-b9fa-2cc15114bdc2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ce9d4162-c615-4041-8082-ae14a74b3d40", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--f6989d14-ab1f-4788-8eea-f15b995856f2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27103", "description": "Accellion FTA Server-Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27103", "source_name": "cve", "external_id": "CVE-2021-27103"}]}, {"type": "relationship", "id": "relationship--bbae2c58-12e7-4272-903e-d5624da48417", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f6989d14-ab1f-4788-8eea-f15b995856f2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--fcb4f824-2027-4382-83d2-9c420df7584e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f6989d14-ab1f-4788-8eea-f15b995856f2", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--c05f566a-5603-4ac4-a080-bc4265b753c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21975", "description": "VMware Server Side Request Forgery in vRealize Operations Manager API", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21975", "source_name": "cve", "external_id": "CVE-2021-21975"}]}, {"type": "relationship", "id": "relationship--edaa2394-8c37-491e-b2b4-59a9d864114e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c05f566a-5603-4ac4-a080-bc4265b753c4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--4ba2aead-b224-467a-be9d-151cba59faf2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21973", "description": "VMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21973", "source_name": "cve", "external_id": "CVE-2021-21973"}]}, {"type": "relationship", "id": "relationship--a32a4803-b36b-443d-b5d5-647d5bde6146", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4ba2aead-b224-467a-be9d-151cba59faf2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ed296d07-f320-4cc0-8591-ab78e0d17eb3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4ba2aead-b224-467a-be9d-151cba59faf2", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "vulnerability", "id": "vulnerability--c8c3c72c-46bf-49c7-a716-33ca9112ea85", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-2533", "description": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2533", "source_name": "cve", "external_id": "CVE-2023-2533"}]}, {"type": "relationship", "id": "relationship--4c1fa1d8-46d0-461f-8c3a-f2d4eff6cf8f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c8c3c72c-46bf-49c7-a716-33ca9112ea85", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "relationship", "id": "relationship--6f09ebe1-d66d-4111-b745-b6968cd55184", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c8c3c72c-46bf-49c7-a716-33ca9112ea85", "target_ref": "attack-pattern--1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf"}, {"type": "relationship", "id": "relationship--02a5c118-ed6d-4d6b-8f4c-d02d5b5d9e9c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c8c3c72c-46bf-49c7-a716-33ca9112ea85", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--b1dd682e-ab2e-409a-88f4-210075deb050", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-34028", "description": "Commvault Command Center Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-34028", "source_name": "cve", "external_id": "CVE-2025-34028"}]}, {"type": "relationship", "id": "relationship--2d7e8a9d-186b-455a-84b0-4e08c2669d7e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b1dd682e-ab2e-409a-88f4-210075deb050", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f848c74a-9aed-4c33-98bf-220bf9326a96", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b1dd682e-ab2e-409a-88f4-210075deb050", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--eb0c1081-d8f1-4d68-b98e-66d8ee99ef7d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-21715", "description": "Microsoft Office Publisher Security Feature Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21715", "source_name": "cve", "external_id": "CVE-2023-21715"}]}, {"type": "relationship", "id": "relationship--744882cc-f6af-48c3-98b3-b34d70404ca8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eb0c1081-d8f1-4d68-b98e-66d8ee99ef7d", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--61af9bd1-801d-4fc8-aa19-a07d32aac2f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-31207", "description": "Microsoft Exchange Server Security Feature Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31207", "source_name": "cve", "external_id": "CVE-2021-31207"}]}, {"type": "relationship", "id": "relationship--aef4c839-fccb-423a-b797-61242f41a454", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--61af9bd1-801d-4fc8-aa19-a07d32aac2f8", "target_ref": "attack-pattern--ac9e6b22-11bf-45d7-9181-c1cb08360931"}, {"type": "relationship", "id": "relationship--93e2b751-855a-422c-aa95-66fdaa33fe95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--61af9bd1-801d-4fc8-aa19-a07d32aac2f8", "target_ref": "attack-pattern--120d5519-3098-4e1c-9191-2aa61232f073"}, {"type": "vulnerability", "id": "vulnerability--acd2e3a0-6bbe-4584-a933-c8d8a95d60c7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-0310", "description": "Adobe Flash Player ASLR Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0310", "source_name": "cve", "external_id": "CVE-2015-0310"}]}, {"type": "relationship", "id": "relationship--2ed6b725-7ce4-4346-9402-d3b9693d07db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--acd2e3a0-6bbe-4584-a933-c8d8a95d60c7", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-31201", "description": "Apple Multiple Products Arbitrary Read and Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31201", "source_name": "cve", "external_id": "CVE-2025-31201"}]}, {"type": "relationship", "id": "relationship--d3868c0b-7fa3-41ef-a2f8-3a2844a884f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--b1e7d6d5-4a45-4920-8483-aa1fcfc7b1e0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--c126d2fc-6e3a-4ca2-9ee3-16ef79f0d151", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--3d333250-30e4-4a82-9edc-756c68afc529"}, {"type": "relationship", "id": "relationship--00c93476-7101-483e-b980-601b0fc74b5f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "relationship", "id": "relationship--6e61f151-7660-4247-8a81-07a4e4011bb3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--4cd3314e-9beb-48c9-b4b6-b76417b981a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--ad255bfe-a9e6-4b52-a258-8d3462abe842"}, {"type": "relationship", "id": "relationship--8017650d-bdae-49c6-8287-be64619c8d75", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a795fa15-200e-4e36-9515-d510f33ef225", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "vulnerability", "id": "vulnerability--68e9c18a-957c-4af0-b0e8-5be205bb2a74", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-0411", "description": "7-Zip Mark of the Web Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0411", "source_name": "cve", "external_id": "CVE-2025-0411"}]}, {"type": "relationship", "id": "relationship--593b74c5-d3df-4017-bb50-990089b15c51", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--68e9c18a-957c-4af0-b0e8-5be205bb2a74", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--372b52f6-9814-4d8f-8afe-6c6a73b877a8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--68e9c18a-957c-4af0-b0e8-5be205bb2a74", "target_ref": "attack-pattern--7e7c2fba-7cca-486c-9582-4c1bb2851961"}, {"type": "relationship", "id": "relationship--afdeef8e-e1d8-46d2-b6d1-19dc89b422bb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--68e9c18a-957c-4af0-b0e8-5be205bb2a74", "target_ref": "attack-pattern--7807d3a4-a885-4639-a786-c1ed41484970"}, {"type": "vulnerability", "id": "vulnerability--dda5991b-3152-46bc-b1f7-ed99b86f9d76", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-21413", "description": "Microsoft Outlook Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21413", "source_name": "cve", "external_id": "CVE-2024-21413"}]}, {"type": "relationship", "id": "relationship--b1f02570-97df-4cdb-8041-3a597383b579", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--dda5991b-3152-46bc-b1f7-ed99b86f9d76", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "relationship", "id": "relationship--c2d2d7b2-2269-4403-b9c2-502da52befb9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--dda5991b-3152-46bc-b1f7-ed99b86f9d76", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--71a8a858-f6de-4b44-a8e8-128381d01868", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2014-0546", "description": "Adobe Acrobat and Reader Sandbox Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0546", "source_name": "cve", "external_id": "CVE-2014-0546"}]}, {"type": "relationship", "id": "relationship--3145f912-f874-48ef-8107-2ae62e44ded4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--71a8a858-f6de-4b44-a8e8-128381d01868", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--a7b8c24f-3693-4c21-a46c-82f98a1bffbb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--71a8a858-f6de-4b44-a8e8-128381d01868", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "vulnerability", "id": "vulnerability--83beb785-823b-4501-bfb0-746ece72e15e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-2783", "description": "Google Chromium Mojo Sandbox Escape Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-2783", "source_name": "cve", "external_id": "CVE-2025-2783"}]}, {"type": "relationship", "id": "relationship--2f955b77-7b3b-4341-8e4b-81aff9418aa5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--83beb785-823b-4501-bfb0-746ece72e15e", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "relationship", "id": "relationship--711fdf68-9d81-4266-873f-47d1e3c189d7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--83beb785-823b-4501-bfb0-746ece72e15e", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--a3adb1f5-172d-44fb-ae85-7fc4d5310019", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--83beb785-823b-4501-bfb0-746ece72e15e", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "vulnerability", "id": "vulnerability--92d81ff3-7c57-4ac7-88cb-15cf3e076ac6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21166", "description": "Google Chromium Race Condition Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21166", "source_name": "cve", "external_id": "CVE-2021-21166"}]}, {"type": "relationship", "id": "relationship--2894c3d2-a853-4cd2-8db7-2e7007b17801", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--92d81ff3-7c57-4ac7-88cb-15cf3e076ac6", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--a9b46fa5-d30f-4dee-8728-aba2be11a0bb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--92d81ff3-7c57-4ac7-88cb-15cf3e076ac6", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--b1ff0fa3-4f75-4138-93b4-aeb0e8e4ecd1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-27524", "description": "Apache Superset Insecure Default Initialization of Resource Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27524", "source_name": "cve", "external_id": "CVE-2023-27524"}]}, {"type": "relationship", "id": "relationship--6d8301c9-e355-4ff5-8641-89aa9eac86e8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b1ff0fa3-4f75-4138-93b4-aeb0e8e4ecd1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7a1e07d6-5eba-4d14-928b-eb39d563b77c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b1ff0fa3-4f75-4138-93b4-aeb0e8e4ecd1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--d81a2668-33d1-4800-867d-a9156f8bc848", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-50302", "description": "Linux Kernel Use of Uninitialized Resource Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50302", "source_name": "cve", "external_id": "CVE-2024-50302"}]}, {"type": "relationship", "id": "relationship--a4f286f7-af0e-45e4-9a32-321f70585cf2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d81a2668-33d1-4800-867d-a9156f8bc848", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--f0c90124-19f0-49e8-a439-7c198197c4b3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d81a2668-33d1-4800-867d-a9156f8bc848", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--60386f96-7b92-4859-aa3c-3243aa8eb635", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d81a2668-33d1-4800-867d-a9156f8bc848", "target_ref": "attack-pattern--51ea26b1-ff1e-4faa-b1a0-1114cd298c87"}, {"type": "vulnerability", "id": "vulnerability--a554b316-56d0-4cdc-8bcc-ba0358191e7c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-38080", "description": "Microsoft Windows Hyper-V Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38080", "source_name": "cve", "external_id": "CVE-2024-38080"}]}, {"type": "relationship", "id": "relationship--7e0c5da2-876b-4018-9899-368ca438646a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a554b316-56d0-4cdc-8bcc-ba0358191e7c", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--264dc238-a930-443d-8ecb-2316f37314e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a554b316-56d0-4cdc-8bcc-ba0358191e7c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--8f69b3c0-9f16-4460-b21e-76d46a7e17a9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-30051", "description": " Microsoft DWM Core Library Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-30051", "source_name": "cve", "external_id": "CVE-2024-30051"}]}, {"type": "relationship", "id": "relationship--b5ba4f48-b2e2-4ef0-a52b-85ebd43c137e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8f69b3c0-9f16-4460-b21e-76d46a7e17a9", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--2553045c-5998-41f6-bf6c-0388824c2830", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-20359", "description": "Cisco ASA and FTD Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20359", "source_name": "cve", "external_id": "CVE-2024-20359"}]}, {"type": "relationship", "id": "relationship--5d3486ae-a7f9-4e6b-aec1-14483ef096bd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2553045c-5998-41f6-bf6c-0388824c2830", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--9cc9d008-3ffe-40e1-99b3-135b48c947d8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2553045c-5998-41f6-bf6c-0388824c2830", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--1a32039f-cb7b-4b28-bf94-062247d9c076", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2553045c-5998-41f6-bf6c-0388824c2830", "target_ref": "attack-pattern--03259939-0b57-482f-8eb5-87c0e0d54334"}, {"type": "vulnerability", "id": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-28252", "description": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28252", "source_name": "cve", "external_id": "CVE-2023-28252"}]}, {"type": "relationship", "id": "relationship--6b5ba5ac-8032-4bf1-94cc-8a1076949326", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--77657d8b-825a-402b-89b4-a3af502ecd00", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--2a2e6aa5-7e3c-4833-b948-4f4e938d6e36", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--cfbdf64f-0e91-4642-a50b-855a1b1f8ea6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "relationship", "id": "relationship--2f1d8d40-1831-4535-862d-80c0ffa90608", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--d1fde6f1-073f-411a-80b8-ddef0abd8515", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--9c942471-703c-43bd-a890-1c975a992c11", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c9d29358-d225-44df-b8f0-b6c59a031df1", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--310e06c5-e51e-463c-b2cf-2fd2b394872e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-28229", "description": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28229", "source_name": "cve", "external_id": "CVE-2023-28229"}]}, {"type": "relationship", "id": "relationship--60ea0ce6-a2b2-4712-a16b-76adad9f02e0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--310e06c5-e51e-463c-b2cf-2fd2b394872e", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--6bba4bac-daa2-442f-ae63-8727d8978e2a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--310e06c5-e51e-463c-b2cf-2fd2b394872e", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--885948d8-f5d5-439b-87fb-30cb2941b279", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-23397", "description": "Microsoft Office Outlook Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23397", "source_name": "cve", "external_id": "CVE-2023-23397"}]}, {"type": "relationship", "id": "relationship--2f44cc28-3443-4b07-8689-4147a025c471", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--885948d8-f5d5-439b-87fb-30cb2941b279", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--1b8e1aca-3dde-4752-a0b7-0f19d408fca9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--885948d8-f5d5-439b-87fb-30cb2941b279", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--6123fa27-ed4b-480a-b0cd-0b97f204ac70", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--885948d8-f5d5-439b-87fb-30cb2941b279", "target_ref": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e"}, {"type": "vulnerability", "id": "vulnerability--392d8c74-b8ba-4eb1-b08e-411fdea47ebb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-21674", "description": "Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-21674", "source_name": "cve", "external_id": "CVE-2023-21674"}]}, {"type": "relationship", "id": "relationship--1debf3cf-a5d7-4cba-b581-91cc8e80ed86", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--392d8c74-b8ba-4eb1-b08e-411fdea47ebb", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--4c421962-8618-45ce-adb1-6aefaec5f8eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--392d8c74-b8ba-4eb1-b08e-411fdea47ebb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--a540eaa0-28de-473b-9659-88281460a5a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20198", "description": "Cisco IOS XE Web UI Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20198", "source_name": "cve", "external_id": "CVE-2023-20198"}]}, {"type": "relationship", "id": "relationship--c6789e66-fcd8-4984-9204-dc9955273345", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a540eaa0-28de-473b-9659-88281460a5a6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--536e1d60-6b59-492c-8256-11719df403e8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a540eaa0-28de-473b-9659-88281460a5a6", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "vulnerability", "id": "vulnerability--a9257b25-ccdc-4bca-a166-3a1988769aed", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41125", "description": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41125", "source_name": "cve", "external_id": "CVE-2022-41125"}]}, {"type": "relationship", "id": "relationship--00fc3b34-a56d-41ea-9515-ff9f948299ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a9257b25-ccdc-4bca-a166-3a1988769aed", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--52264238-9577-4c2b-ac1b-a4741a892a8e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a9257b25-ccdc-4bca-a166-3a1988769aed", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--8d6172e7-4a39-4aea-8c50-8d608ce0e216", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a9257b25-ccdc-4bca-a166-3a1988769aed", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--efd28b10-9cc8-4727-b751-2c61032a3719", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41073", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41073", "source_name": "cve", "external_id": "CVE-2022-41073"}]}, {"type": "relationship", "id": "relationship--6565ec05-e7bb-4b0e-8da7-7ad88e0be9c6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--efd28b10-9cc8-4727-b751-2c61032a3719", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--5063786a-d32a-4b74-830b-5e6f657e2469", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--efd28b10-9cc8-4727-b751-2c61032a3719", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--68d5fc27-bc36-40b3-b839-0ab2a0abe418", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--efd28b10-9cc8-4727-b751-2c61032a3719", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--9d2e66af-3efb-438d-b40e-d4212d3d1a10", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41033", "description": "Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41033", "source_name": "cve", "external_id": "CVE-2022-41033"}]}, {"type": "relationship", "id": "relationship--ae4769ad-5e91-4100-97cf-d581ba584361", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9d2e66af-3efb-438d-b40e-d4212d3d1a10", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--fa549967-c43c-4a17-b445-0c956f450bc6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9d2e66af-3efb-438d-b40e-d4212d3d1a10", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--aea1aab5-8d66-4fba-87c1-8f85e01649b2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-37969", "description": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37969", "source_name": "cve", "external_id": "CVE-2022-37969"}]}, {"type": "relationship", "id": "relationship--b7cbb43e-404c-4b8b-89d0-faa0c11a2bf6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--aea1aab5-8d66-4fba-87c1-8f85e01649b2", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e1414a6b-b76f-4e71-835c-8f5bbe6e603e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--aea1aab5-8d66-4fba-87c1-8f85e01649b2", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--0efd5be4-f968-4131-bbcb-22fadf827987", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--aea1aab5-8d66-4fba-87c1-8f85e01649b2", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--158417a2-36b4-46f1-a9e9-a173583167a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26904", "description": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26904", "source_name": "cve", "external_id": "CVE-2022-26904"}]}, {"type": "relationship", "id": "relationship--0ed687e3-845d-4926-b325-8d7f48aa2fd3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--158417a2-36b4-46f1-a9e9-a173583167a1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--2bad8db0-e8bc-48ab-84ec-e3ba26ca22eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--158417a2-36b4-46f1-a9e9-a173583167a1", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--1b7f2d99-6525-465d-8a4e-5a23c5cc1f3a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-24521", "description": "Microsoft Windows CLFS Driver Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24521", "source_name": "cve", "external_id": "CVE-2022-24521"}]}, {"type": "relationship", "id": "relationship--b16e3d9d-1ec0-46c4-957e-2abef4c41b54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1b7f2d99-6525-465d-8a4e-5a23c5cc1f3a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c2f530b8-113b-429f-a10c-5c02f52edeb3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1b7f2d99-6525-465d-8a4e-5a23c5cc1f3a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--7191c9ec-bff6-436b-bd05-af8b6784a8a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1b7f2d99-6525-465d-8a4e-5a23c5cc1f3a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--c079c3d9-73c0-489b-b26c-e0f68c8d8bb0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22960", "description": "VMware Multiple Products Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22960", "source_name": "cve", "external_id": "CVE-2022-22960"}]}, {"type": "relationship", "id": "relationship--db4a5986-093a-4bc3-bc11-ed69f38e04c7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c079c3d9-73c0-489b-b26c-e0f68c8d8bb0", "target_ref": "attack-pattern--65917ae0-b854-4139-83fe-bf2441cf0196"}, {"type": "vulnerability", "id": "vulnerability--85232df9-8579-4731-b123-7757005c9bc4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22718", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22718", "source_name": "cve", "external_id": "CVE-2022-22718"}]}, {"type": "relationship", "id": "relationship--ab10d432-2a20-45bc-a95c-3b2acb10be23", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--85232df9-8579-4731-b123-7757005c9bc4", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--cc165331-7618-44ba-b9a6-f4a7c30a2cf6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--85232df9-8579-4731-b123-7757005c9bc4", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--68d50448-c714-4d90-a197-15816c5e6bd2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22047", "description": "Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22047", "source_name": "cve", "external_id": "CVE-2022-22047"}]}, {"type": "relationship", "id": "relationship--d4ddf7f9-4fe9-4b56-945d-865cb24d582b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--68d50448-c714-4d90-a197-15816c5e6bd2", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3b887af0-6ce4-4305-81b4-cd2f0f9cd63f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--68d50448-c714-4d90-a197-15816c5e6bd2", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--7d83291d-1482-4b59-9e61-48500395ce98", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--68d50448-c714-4d90-a197-15816c5e6bd2", "target_ref": "attack-pattern--9efb1ea7-c37b-4595-9640-b7680cd84279"}, {"type": "relationship", "id": "relationship--507449d7-5807-4a16-a3a9-f8dc03a3d51d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--68d50448-c714-4d90-a197-15816c5e6bd2", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-21999", "description": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21999", "source_name": "cve", "external_id": "CVE-2022-21999"}]}, {"type": "relationship", "id": "relationship--b45d2970-075f-48ce-9931-305c7952f29a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ec35ab5a-91fa-4bf3-9e30-26b3e3f2cd18", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--3182403e-2d2c-424e-b04f-457ef8e91691", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "target_ref": "attack-pattern--635cbe30-392d-4e27-978e-66774357c762"}, {"type": "relationship", "id": "relationship--112b1849-506c-4946-9913-4274069bc97e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "target_ref": "attack-pattern--fe926152-f431-4baf-956c-4ad3cb0bf23b"}, {"type": "relationship", "id": "relationship--89e6e748-5e33-478e-b67f-98a40df89a76", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4f21f901-47a8-4fa3-bb16-ea9c598e1c2a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--8ce6afe2-9c5a-4c28-8991-ac8bd54119cf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-21919", "description": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21919", "source_name": "cve", "external_id": "CVE-2022-21919"}]}, {"type": "relationship", "id": "relationship--4bacbe60-d306-4554-9518-28e8aae0c728", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8ce6afe2-9c5a-4c28-8991-ac8bd54119cf", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--7f69d2be-dfba-4668-abdc-2ea7360e8947", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8ce6afe2-9c5a-4c28-8991-ac8bd54119cf", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--f7baf804-ead4-47e0-a16d-93f71dec98ef", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-41379", "description": "Microsoft Windows Installer Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41379", "source_name": "cve", "external_id": "CVE-2021-41379"}]}, {"type": "relationship", "id": "relationship--f0b9b160-89f0-474d-a0e9-66b306e10263", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f7baf804-ead4-47e0-a16d-93f71dec98ef", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--58babc32-c604-4c1b-8fea-7dbcc55948a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f7baf804-ead4-47e0-a16d-93f71dec98ef", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-40449", "description": "Microsoft Windows Win32k Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40449", "source_name": "cve", "external_id": "CVE-2021-40449"}]}, {"type": "relationship", "id": "relationship--4ae0f673-6312-4f4e-bcff-9c3c77938f3d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--89b6effa-3ead-4369-888e-88fea316884f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--062197a3-cbdc-430d-8d24-c303f6561242", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--31fb7bdc-82e5-4fb9-bf2c-de613ae219bb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--707399d6-ab3e-4963-9315-d9d3818cd6a0"}, {"type": "relationship", "id": "relationship--07f03b1b-4d76-4d2e-9323-5d1129a51cb0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--8f1a688e-aa4a-4b51-bb95-d91f7f6e4e28", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--d0531cda-7c9a-4400-a5a2-32bbce3ecead", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--68919ca1-58f4-4882-8c25-31fed547475c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--08b6d554-d9a4-44f9-85fe-784b68503ceb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--4b0a2a99-272c-4062-9b7b-0fc4fc362b7f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-36934", "description": "Microsoft Windows SAM Local Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36934", "source_name": "cve", "external_id": "CVE-2021-36934"}]}, {"type": "relationship", "id": "relationship--558c485b-fde2-49f6-9bcb-96ffc92df4fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b0a2a99-272c-4062-9b7b-0fc4fc362b7f", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--08c33f89-f4e3-4b87-8034-2a791fafc4e2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b0a2a99-272c-4062-9b7b-0fc4fc362b7f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--723e9cfb-7f9e-4631-9848-140f46281abb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-34523", "description": "Microsoft Exchange Server Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34523", "source_name": "cve", "external_id": "CVE-2021-34523"}]}, {"type": "relationship", "id": "relationship--bfab8dd1-157e-4555-80d8-615e5c975aea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--723e9cfb-7f9e-4631-9848-140f46281abb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--bf9b63fd-ac12-4d28-b1be-3694652bbe64", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-33739", "description": "Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33739", "source_name": "cve", "external_id": "CVE-2021-33739"}]}, {"type": "relationship", "id": "relationship--5e556ad6-b596-488e-8400-ddf75bd50af9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bf9b63fd-ac12-4d28-b1be-3694652bbe64", "target_ref": "attack-pattern--8982a661-d84c-48c0-b4ec-1db29c6cf3bc"}, {"type": "relationship", "id": "relationship--0c145c8f-ada2-4819-b635-937d39bfd1f1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bf9b63fd-ac12-4d28-b1be-3694652bbe64", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-1472", "description": "Microsoft Netlogon Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472", "source_name": "cve", "external_id": "CVE-2020-1472"}]}, {"type": "relationship", "id": "relationship--305d7e26-d71c-47c5-bf2a-a6dbe23a651d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--2ce1a749-598b-429c-b778-f30a771350c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--82e5d696-8811-4cb7-84db-8cf0ff6bb271", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--5b359eef-1a92-46df-8266-303d0929c68e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "relationship", "id": "relationship--1a9ac471-f1f5-46dd-9943-73c500f11caa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--a93494bb-4b80-4ea1-8695-3236a49916fd"}, {"type": "relationship", "id": "relationship--dfd71172-545f-4cc3-872c-8d8b512fb1dd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--b1d4520c-0718-43b0-a9df-c5398ffd392d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--ab93f38a-5562-45ab-a68b-d5b83d699b93", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27797f9e-40b4-489e-90ad-c1be5b503495", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--1f54b593-1797-4e34-b9cb-903a7d70dbb7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-0211", "description": "Apache HTTP Server Privilege Escalation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0211", "source_name": "cve", "external_id": "CVE-2019-0211"}]}, {"type": "relationship", "id": "relationship--c13097f2-d94e-4dfe-b659-b2e57da38809", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1f54b593-1797-4e34-b9cb-903a7d70dbb7", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--b88d5c58-10f2-402c-81e1-0e0c13b48759", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21391", "description": "Microsoft Windows Storage Link Following Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21391", "source_name": "cve", "external_id": "CVE-2025-21391"}]}, {"type": "relationship", "id": "relationship--9406edc5-e960-4a1a-9ba3-98da8eefda59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b88d5c58-10f2-402c-81e1-0e0c13b48759", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--3a5cc0c8-341c-4b2e-9c88-f895dea39495", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b88d5c58-10f2-402c-81e1-0e0c13b48759", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--c16dfe73-cc2d-49de-8e21-010565970e8b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b88d5c58-10f2-402c-81e1-0e0c13b48759", "target_ref": "attack-pattern--f5d8eed6-48a9-4cdf-a3d7-d1ffa99c3d2a"}, {"type": "vulnerability", "id": "vulnerability--5ee04272-1940-460b-83c5-ae7b7125cee6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-1976", "description": "Broadcom Brocade Fabric OS Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1976", "source_name": "cve", "external_id": "CVE-2025-1976"}]}, {"type": "relationship", "id": "relationship--ab775d8d-d29a-443e-8e9b-4595a54f2a16", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5ee04272-1940-460b-83c5-ae7b7125cee6", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--a1e6cb99-28b4-4fab-8de9-f2bdf92209e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5ee04272-1940-460b-83c5-ae7b7125cee6", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--eaab5fd7-60e4-4583-a0df-e41124ba0b11", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-12686", "description": "BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12686", "source_name": "cve", "external_id": "CVE-2024-12686"}]}, {"type": "relationship", "id": "relationship--22db0bf6-bd83-49a3-bcce-3138cdc9520d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eaab5fd7-60e4-4583-a0df-e41124ba0b11", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--7331c867-aff7-481c-927d-7604e58aba27", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eaab5fd7-60e4-4583-a0df-e41124ba0b11", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--bc9c75f1-59c3-4f2c-ba30-0a4dbc0990aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-0386", "description": "Linux Kernel Improper Ownership Management Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0386", "source_name": "cve", "external_id": "CVE-2023-0386"}]}, {"type": "relationship", "id": "relationship--863380bf-6799-4a1b-b084-c9112cb4a11f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bc9c75f1-59c3-4f2c-ba30-0a4dbc0990aa", "target_ref": "attack-pattern--b200542e-e877-4395-875b-cf1a44537ca4"}, {"type": "relationship", "id": "relationship--1488ef51-2b4d-41b7-bb12-feb1a858aaf1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bc9c75f1-59c3-4f2c-ba30-0a4dbc0990aa", "target_ref": "attack-pattern--6831414d-bb70-42b7-8030-d4e06b2660c9"}, {"type": "relationship", "id": "relationship--f562a0ae-7e9d-4e2a-b918-6d81f034a30d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bc9c75f1-59c3-4f2c-ba30-0a4dbc0990aa", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--a20e3597-ca93-47c6-adf4-1bf64dd8bff8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--bc9c75f1-59c3-4f2c-ba30-0a4dbc0990aa", "target_ref": "attack-pattern--3d333250-30e4-4a82-9edc-756c68afc529"}, {"type": "vulnerability", "id": "vulnerability--4c799e7f-0cc4-4da1-bb02-27049cee488a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2014-8439", "description": "Adobe Flash Player Dereferenced Pointer Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8439", "source_name": "cve", "external_id": "CVE-2014-8439"}]}, {"type": "relationship", "id": "relationship--9afcca67-f1d3-4315-b46e-58aba464b800", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4c799e7f-0cc4-4da1-bb02-27049cee488a", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--7d080e1c-6902-46cb-813a-47f633bf326f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-4990", "description": "Adobe Acrobat and Reader Double Free Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4990", "source_name": "cve", "external_id": "CVE-2018-4990"}]}, {"type": "relationship", "id": "relationship--2ed0f82d-7f15-4ead-ac93-6fb4c3322e6c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7d080e1c-6902-46cb-813a-47f633bf326f", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--15743b48-7aa7-4768-8fbb-a95eeb82408a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7d080e1c-6902-46cb-813a-47f633bf326f", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--5bece1e7-0014-4ec5-9432-ca298e82a2aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4978", "description": "Justice AV Solutions (JAVS) Viewer Installer Embedded Malicious Code Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4978", "source_name": "cve", "external_id": "CVE-2024-4978"}]}, {"type": "relationship", "id": "relationship--25462c6f-e4d8-42c6-88bd-53336c80a955", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5bece1e7-0014-4ec5-9432-ca298e82a2aa", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--44b57666-7dd8-4a6f-9053-7f1c5c7318cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5bece1e7-0014-4ec5-9432-ca298e82a2aa", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--358e61a9-1dbe-4c3b-ab1d-0900d603cbd0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5bece1e7-0014-4ec5-9432-ca298e82a2aa", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--a29470d8-1d5b-481c-b237-d1b7287f39c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5bece1e7-0014-4ec5-9432-ca298e82a2aa", "target_ref": "attack-pattern--bd369cd9-abb8-41ce-b5bb-fff23ee86c00"}, {"type": "vulnerability", "id": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-23692", "description": "Rejetto HTTP File Server Improper Neutralization of Special Elements Used in a Template Engine Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23692", "source_name": "cve", "external_id": "CVE-2024-23692"}]}, {"type": "relationship", "id": "relationship--546369fe-1e20-4b67-ad73-8c4ce9f82d11", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--03b66276-a1c0-43ad-b7b3-c9469e169c2f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--92242ea8-af82-4220-80a6-af4e10bd96e3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--f026243f-7fe7-4d08-97f0-4d0b5bf54990", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--32a69e3b-677a-4c88-a9f1-968c06f4b5ca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--375dae20-f572-441b-aa45-3bc4d2cc1dff", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "vulnerability", "id": "vulnerability--39eee609-8fbb-427c-9491-0450f574e57a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-44487", "description": "HTTP/2 Rapid Reset Attack Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487", "source_name": "cve", "external_id": "CVE-2023-44487"}]}, {"type": "relationship", "id": "relationship--19220d63-6ce5-4dd5-8db8-e9b43b8ae8d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--39eee609-8fbb-427c-9491-0450f574e57a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0f61110b-a2e7-484b-9376-fc556e1a60dc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--39eee609-8fbb-427c-9491-0450f574e57a", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "vulnerability", "id": "vulnerability--4efd01f2-dae7-483e-8b58-5d030c25ee94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36845", "description": "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36845", "source_name": "cve", "external_id": "CVE-2023-36845"}]}, {"type": "relationship", "id": "relationship--81c3f7f5-215b-4425-bce4-24bd9b68ab42", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4efd01f2-dae7-483e-8b58-5d030c25ee94", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--02372e67-40ae-49a6-a050-cdc90b9ad2f5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4efd01f2-dae7-483e-8b58-5d030c25ee94", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--ddcda43d-3c22-4069-acac-4315d9671f92", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36844", "description": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36844", "source_name": "cve", "external_id": "CVE-2023-36844"}]}, {"type": "relationship", "id": "relationship--3920ab70-fb31-4b41-8467-f13b5958c9e7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ddcda43d-3c22-4069-acac-4315d9671f92", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8712fed3-2926-40d3-abb0-ee5a0dc01f59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ddcda43d-3c22-4069-acac-4315d9671f92", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--6708dae6-50e1-4760-8354-7d331323e271", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20821", "description": "Cisco IOS XR Open Port Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20821", "source_name": "cve", "external_id": "CVE-2022-20821"}]}, {"type": "relationship", "id": "relationship--cb0d37e0-811d-43d0-9815-916a833e50bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6708dae6-50e1-4760-8354-7d331323e271", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--c0f2a782-5adc-4880-b89d-f39a67cca2e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-8515", "description": "Multiple DrayTek Vigor Routers Web Management Page Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8515", "source_name": "cve", "external_id": "CVE-2020-8515"}]}, {"type": "relationship", "id": "relationship--b2d84ee0-78a2-435e-88c0-337589c54730", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c0f2a782-5adc-4880-b89d-f39a67cca2e1", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--7a3bb5d0-cd33-408b-8dbc-e1a4ed7a31ce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c0f2a782-5adc-4880-b89d-f39a67cca2e1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ae333645-b307-44e0-84f7-2dd1685f58bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c0f2a782-5adc-4880-b89d-f39a67cca2e1", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--873ce267-b99f-4883-ba4d-b1479828a4e8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2009-1862", "description": "Adobe Acrobat and Reader, Flash Player Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1862", "source_name": "cve", "external_id": "CVE-2009-1862"}]}, {"type": "relationship", "id": "relationship--6993b59b-89c4-4b73-bc18-b0ffb45b04d2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--873ce267-b99f-4883-ba4d-b1479828a4e8", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--beef27d7-0326-489f-8da3-52f2e0a335f6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2008-0655", "description": "Adobe Acrobat and Reader Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", "source_name": "cve", "external_id": "CVE-2008-0655"}]}, {"type": "relationship", "id": "relationship--9acb9d74-7626-4e42-b1ce-ddc6547f7345", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--beef27d7-0326-489f-8da3-52f2e0a335f6", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--6130a464-61d2-4362-86eb-710a2c659bac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-0111", "description": "Palo Alto Networks PAN-OS File Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0111", "source_name": "cve", "external_id": "CVE-2025-0111"}]}, {"type": "relationship", "id": "relationship--f75a4e5c-2dbd-44a9-91c6-d1dd6aae8d1a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6130a464-61d2-4362-86eb-710a2c659bac", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--0af7afa4-cf83-4d4a-9bb0-26c2bd317257", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6130a464-61d2-4362-86eb-710a2c659bac", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--4b4ded7b-8770-4402-ae64-09c711c04508", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-58136", "description": "Yiiframework Yii Improper Protection of Alternate Path Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-58136", "source_name": "cve", "external_id": "CVE-2024-58136"}]}, {"type": "relationship", "id": "relationship--a321b232-d119-48d9-b8af-9bb02dfbdf58", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b4ded7b-8770-4402-ae64-09c711c04508", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--ebb89e61-69f7-49e6-bc7f-f3de1aed1b4e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b4ded7b-8770-4402-ae64-09c711c04508", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--b82ae142-87fa-4a01-90b8-271903db99bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-45195", "description": "Apache OFBiz Forced Browsing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45195", "source_name": "cve", "external_id": "CVE-2024-45195"}]}, {"type": "relationship", "id": "relationship--9a3cebb6-ac7d-4132-ae7a-e1e5f69bafc3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b82ae142-87fa-4a01-90b8-271903db99bf", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--47fc8eab-489e-4af3-8c5c-ac5e2f4f199e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b82ae142-87fa-4a01-90b8-271903db99bf", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--f21200db-aabf-4b37-88cb-84d3856b263e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b82ae142-87fa-4a01-90b8-271903db99bf", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c6b860f9-39f0-4b4a-bd2c-64a4e6835e59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b82ae142-87fa-4a01-90b8-271903db99bf", "target_ref": "attack-pattern--0bda01d5-4c1d-4062-8ee2-6872334383c3"}, {"type": "vulnerability", "id": "vulnerability--35a2eb62-8171-40d8-a32c-fd5c31d3185e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-38475", "description": "Apache HTTP Server Improper Escaping of Output Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38475", "source_name": "cve", "external_id": "CVE-2024-38475"}]}, {"type": "relationship", "id": "relationship--93258e31-ed4c-41a7-bab6-870b1b1dd2bc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--35a2eb62-8171-40d8-a32c-fd5c31d3185e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6080d0f4-f66c-411f-aaf3-c312802dec01", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--35a2eb62-8171-40d8-a32c-fd5c31d3185e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0c2bca73-951c-448a-816d-f57a483b775a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--35a2eb62-8171-40d8-a32c-fd5c31d3185e", "target_ref": "attack-pattern--890c9858-598c-401d-a4d5-c67ebcdd703a"}, {"type": "relationship", "id": "relationship--554fe290-05a7-474d-bc04-f4ba0b253b14", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--35a2eb62-8171-40d8-a32c-fd5c31d3185e", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--2df8764d-348c-4c20-95f6-d5807f1e7e89", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-29059", "description": "Microsoft .NET Framework Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29059", "source_name": "cve", "external_id": "CVE-2024-29059"}]}, {"type": "relationship", "id": "relationship--aaa35b97-7940-4150-b5e7-6947e15df1d8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2df8764d-348c-4c20-95f6-d5807f1e7e89", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--43b690f8-a4e6-48a0-91d0-7569c0acbeed", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2df8764d-348c-4c20-95f6-d5807f1e7e89", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--474f35bf-dbc7-4eb1-a462-e3428f4701a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-48365", "description": "Qlik Sense HTTP Tunneling Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48365", "source_name": "cve", "external_id": "CVE-2023-48365"}]}, {"type": "relationship", "id": "relationship--28bfa4d1-771d-4912-b46c-b91bcc6ee8e7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--474f35bf-dbc7-4eb1-a462-e3428f4701a2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c47126f8-a04c-4a8d-a4f9-49e4d1ad8cbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--474f35bf-dbc7-4eb1-a462-e3428f4701a2", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--577b2960-804f-42d6-9d79-578fc77baeb1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--474f35bf-dbc7-4eb1-a462-e3428f4701a2", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9eb538c5-793f-4c40-9c05-15f0c636b53f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-23748", "description": "Dante Discovery Process Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23748", "source_name": "cve", "external_id": "CVE-2022-23748"}]}, {"type": "relationship", "id": "relationship--423b6900-4201-41ee-8abb-edf42f97ecc0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9eb538c5-793f-4c40-9c05-15f0c636b53f", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--266a1235-7bb6-415b-aaed-08f5dbfad020", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9eb538c5-793f-4c40-9c05-15f0c636b53f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--e929b5ed-a609-4ca0-8d0e-f95387421a6c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-48928", "description": "TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48928", "source_name": "cve", "external_id": "CVE-2025-48928"}]}, {"type": "relationship", "id": "relationship--954c0f9d-f878-4f89-aaa7-b06513e38d69", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e929b5ed-a609-4ca0-8d0e-f95387421a6c", "target_ref": "attack-pattern--9c306d8d-cde7-4b4c-b6e8-d0bb16caca36"}, {"type": "relationship", "id": "relationship--f9cc3b2f-e9d8-4177-9d7e-8d70fc3a1f5b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e929b5ed-a609-4ca0-8d0e-f95387421a6c", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--55ef594a-9cf9-42ac-9d3b-234ccd676561", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e929b5ed-a609-4ca0-8d0e-f95387421a6c", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "vulnerability", "id": "vulnerability--c6f86991-7223-463b-a2b2-c427011474d2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-48927", "description": "TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48927", "source_name": "cve", "external_id": "CVE-2025-48927"}]}, {"type": "relationship", "id": "relationship--bbff62fa-9f36-4c2d-b72a-58a0306ea36f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c6f86991-7223-463b-a2b2-c427011474d2", "target_ref": "attack-pattern--9c306d8d-cde7-4b4c-b6e8-d0bb16caca36"}, {"type": "relationship", "id": "relationship--3c52fbb7-5053-4124-a293-246ddf7512cc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c6f86991-7223-463b-a2b2-c427011474d2", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--03d95d2c-3016-44fd-bfb6-035b24130bbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c6f86991-7223-463b-a2b2-c427011474d2", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "vulnerability", "id": "vulnerability--1313f9df-a8a7-4067-b030-0dabd1c0a8a3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-3928", "description": "Commvault Web Server Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3928", "source_name": "cve", "external_id": "CVE-2025-3928"}]}, {"type": "relationship", "id": "relationship--eea77f0d-c827-487b-a71f-40f25ec8bd25", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1313f9df-a8a7-4067-b030-0dabd1c0a8a3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--a0f85be1-3963-4f19-9694-1b21073f6eba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1313f9df-a8a7-4067-b030-0dabd1c0a8a3", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--2ff1e330-ecad-41a1-8f14-bfb8e1b54bba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-35939", "description": "Craft CMS External Control of Assumed-Immutable Web Parameter Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-35939", "source_name": "cve", "external_id": "CVE-2025-35939"}]}, {"type": "relationship", "id": "relationship--0aaee431-b08a-4d40-9921-a76fa8f6b7f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2ff1e330-ecad-41a1-8f14-bfb8e1b54bba", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f487f0e5-63c2-4eec-a32b-1124ac1f0fbb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2ff1e330-ecad-41a1-8f14-bfb8e1b54bba", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--0454ccaa-867d-4f19-aaf9-e03d46a4d92f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2ff1e330-ecad-41a1-8f14-bfb8e1b54bba", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-33053", "description": " Microsoft Windows External Control of File Name or Path Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33053", "source_name": "cve", "external_id": "CVE-2025-33053"}]}, {"type": "relationship", "id": "relationship--a0d9392a-140c-499f-ae20-d6a35367d3ca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--01278636-309a-42f6-bc5d-91c1337604be", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e5f7bc97-131b-48af-b6fb-cc98c82d844b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "target_ref": "attack-pattern--09a60ea3-a8d1-4ae5-976e-5783248b72a4"}, {"type": "relationship", "id": "relationship--d5b75865-762f-43e7-8236-21da739223b7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--463bfc98-aab0-4e46-bfac-65b9478829e2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0de17be9-bfb8-477b-9af9-bb9586c835cf", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "vulnerability", "id": "vulnerability--9ba0936d-2183-4fe5-9ec0-35aa3899dea4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-11882", "description": "Microsoft Office Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882", "source_name": "cve", "external_id": "CVE-2017-11882"}]}, {"type": "relationship", "id": "relationship--70f5b8d9-39fc-423f-b84e-b0e4afb67c04", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9ba0936d-2183-4fe5-9ec0-35aa3899dea4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--19f738bf-e088-4ee8-979a-e90cec79d987", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9ba0936d-2183-4fe5-9ec0-35aa3899dea4", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--ef77cc18-8343-44fd-a64c-35743d45d22e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-3043", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3043", "source_name": "cve", "external_id": "CVE-2015-3043"}]}, {"type": "relationship", "id": "relationship--0abfdf82-3c4e-4e05-9c01-0f45c3c11ab6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ef77cc18-8343-44fd-a64c-35743d45d22e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--5aa8a148-4011-4eb6-969a-78560891adeb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ef77cc18-8343-44fd-a64c-35743d45d22e", "target_ref": "attack-pattern--2bee5ffb-7a7a-4119-b1f2-158151b19ac0"}, {"type": "relationship", "id": "relationship--8ddb1e81-17ac-41a1-8206-179b3085b6a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ef77cc18-8343-44fd-a64c-35743d45d22e", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--f64b8553-30f0-4698-9f94-84d45d4d8d9a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-3346", "description": "Adobe Reader and Acrobat Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3346", "source_name": "cve", "external_id": "CVE-2013-3346"}]}, {"type": "relationship", "id": "relationship--4b2b8b33-284c-4feb-b01e-6b5b8fb45a3c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f64b8553-30f0-4698-9f94-84d45d4d8d9a", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--e93fdd86-b73d-4353-8356-f50102a2c46a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0640", "description": "Adobe Reader and Acrobat Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0640", "source_name": "cve", "external_id": "CVE-2013-0640"}]}, {"type": "relationship", "id": "relationship--0e216ce8-d504-4286-9be3-b2f11d40c9c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e93fdd86-b73d-4353-8356-f50102a2c46a", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "vulnerability", "id": "vulnerability--dea7d093-945d-43e8-a80f-c636712c670f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2012-2034", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2034", "source_name": "cve", "external_id": "CVE-2012-2034"}]}, {"type": "relationship", "id": "relationship--f7f94c39-97bc-4f6d-8ed7-94648ce44dc8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--dea7d093-945d-43e8-a80f-c636712c670f", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--59cb4a71-1404-49ed-acfc-8b72eab498ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2012-0754", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0754", "source_name": "cve", "external_id": "CVE-2012-0754"}]}, {"type": "relationship", "id": "relationship--87b4737a-d5ba-46a3-9cec-c9d02b56dca5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--59cb4a71-1404-49ed-acfc-8b72eab498ec", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--0ba8c46e-92c6-43ca-90ad-bddbadddde51", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--59cb4a71-1404-49ed-acfc-8b72eab498ec", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--62e756ca-6596-4c48-bf31-bd57604e5bf6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2010-1297", "description": "Adobe Flash Player Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1297", "source_name": "cve", "external_id": "CVE-2010-1297"}]}, {"type": "relationship", "id": "relationship--1852bd8e-7dce-41ea-bced-3484d0159a3d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--62e756ca-6596-4c48-bf31-bd57604e5bf6", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--e272a886-794b-40f6-8363-1d1da584d999", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--62e756ca-6596-4c48-bf31-bd57604e5bf6", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--ad706052-45d1-4a25-8225-5334cae6cb08", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--62e756ca-6596-4c48-bf31-bd57604e5bf6", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-31200", "description": "Apple Multiple Products Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31200", "source_name": "cve", "external_id": "CVE-2025-31200"}]}, {"type": "relationship", "id": "relationship--9db50942-e516-403e-b169-6e3e244ada6e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--41bfa32b-5c03-42af-826f-f8f017fde4e3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--4d1cc610-4e4f-4c86-a2a9-b9955b128d3d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--3d333250-30e4-4a82-9edc-756c68afc529"}, {"type": "relationship", "id": "relationship--672f7854-fc84-47eb-9e15-e9e5f6f87b13", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "relationship", "id": "relationship--1a0631f6-a4d8-43ac-bfa5-cc9f644e2d3e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--1a20ca53-f405-4f41-840f-2565775b0388", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--ad255bfe-a9e6-4b52-a258-8d3462abe842"}, {"type": "relationship", "id": "relationship--57ae33de-86c3-4a13-aac8-84794e717676", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0cb91200-df31-47a9-bda6-fb959dfcf47d", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "vulnerability", "id": "vulnerability--3498553c-20e9-49c0-aea0-115650b68861", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21480", "description": "Qualcomm Multiple Chipsets Incorrect Authorization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21480", "source_name": "cve", "external_id": "CVE-2025-21480"}]}, {"type": "relationship", "id": "relationship--d4df61b7-624e-4b1b-92cc-ec95753c21b1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3498553c-20e9-49c0-aea0-115650b68861", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--8f883a92-18ca-48dc-a48d-44eef5651bef", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3498553c-20e9-49c0-aea0-115650b68861", "target_ref": "attack-pattern--f5bb433e-bdf6-4781-84bc-35e97e43be89"}, {"type": "vulnerability", "id": "vulnerability--c8c6f9dc-5598-4d01-84b7-5f56b9841a43", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2011-2462", "description": "Adobe Acrobat and Reader Universal 3D Memory Corruption Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2462", "source_name": "cve", "external_id": "CVE-2011-2462"}]}, {"type": "relationship", "id": "relationship--54579b36-9e70-4959-bd5b-5d3cd93fe765", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c8c6f9dc-5598-4d01-84b7-5f56b9841a43", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--a7bcfd9c-c013-429c-840f-bf8881833a49", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-2136", "description": "Google Chrome Skia Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2136", "source_name": "cve", "external_id": "CVE-2023-2136"}]}, {"type": "relationship", "id": "relationship--f7162530-dac6-42a8-b7d2-62e90e660a22", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a7bcfd9c-c013-429c-840f-bf8881833a49", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--19cc3997-8eef-4506-b021-f4bd6e298916", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-1010", "description": "Adobe Flash Player and AIR Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1010", "source_name": "cve", "external_id": "CVE-2016-1010"}]}, {"type": "relationship", "id": "relationship--f1736852-24cf-4f00-ac8a-d7ef63050015", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--19cc3997-8eef-4506-b021-f4bd6e298916", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--2cb01b78-3693-4ce6-81db-28ea291dda35", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-8651", "description": "Adobe Flash Player Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8651", "source_name": "cve", "external_id": "CVE-2015-8651"}]}, {"type": "relationship", "id": "relationship--ccb85e5a-42a0-4108-a769-ce45f408bc53", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2cb01b78-3693-4ce6-81db-28ea291dda35", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--89db72ee-0165-469c-a914-d9776b8fc935", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2cb01b78-3693-4ce6-81db-28ea291dda35", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--bfd11e68-c559-4e8c-91b7-d37204f4f680", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2cb01b78-3693-4ce6-81db-28ea291dda35", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--05347222-f153-4283-afd8-f9538aacf713", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2012-5054", "description": "Adobe Flash Player Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5054", "source_name": "cve", "external_id": "CVE-2012-5054"}]}, {"type": "relationship", "id": "relationship--701e11e3-8d4a-4445-9660-6b78734e1f13", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--05347222-f153-4283-afd8-f9538aacf713", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--be60192f-3547-4abe-8e3d-89a6b26a6495", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24985", "description": "Microsoft Windows Fast FAT File System Driver Integer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24985", "source_name": "cve", "external_id": "CVE-2025-24985"}]}, {"type": "relationship", "id": "relationship--c8b978bb-4788-4750-9684-635ed6bae42d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--be60192f-3547-4abe-8e3d-89a6b26a6495", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--9a289026-7d28-4c1a-9b34-9f3020a9b7ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--be60192f-3547-4abe-8e3d-89a6b26a6495", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--1f448a08-71ad-462d-9cdb-89c6fd39073c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-26169", "description": "Microsoft Windows Error Reporting Service Improper Privilege Management Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26169", "source_name": "cve", "external_id": "CVE-2024-26169"}]}, {"type": "relationship", "id": "relationship--4008ed6a-dac7-414e-9179-6f2e48e8025d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1f448a08-71ad-462d-9cdb-89c6fd39073c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--5c3a0577-8407-4c17-be4c-fc75f8653f6d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1f448a08-71ad-462d-9cdb-89c6fd39073c", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--c29e9f54-c862-4dd9-90cc-77d02838f997", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1f448a08-71ad-462d-9cdb-89c6fd39073c", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "vulnerability", "id": "vulnerability--0e4a02ed-5e85-48bc-8199-9592da1ca87e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20269", "description": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20269", "source_name": "cve", "external_id": "CVE-2023-20269"}]}, {"type": "relationship", "id": "relationship--c67e9afd-e2dd-472c-9ca0-a4172a524623", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0e4a02ed-5e85-48bc-8199-9592da1ca87e", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--fbe13053-1674-4952-964b-d82898de4fac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0e4a02ed-5e85-48bc-8199-9592da1ca87e", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--3d97d688-6846-4620-9afc-51e1a67dd08f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-0787", "description": "Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0787", "source_name": "cve", "external_id": "CVE-2020-0787"}]}, {"type": "relationship", "id": "relationship--3822058f-5659-4b2b-aefd-a077bfcc25b5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3d97d688-6846-4620-9afc-51e1a67dd08f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--a6936ab0-96c7-4867-9c8c-19b8c7f14944", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3d97d688-6846-4620-9afc-51e1a67dd08f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--60f275fb-8f87-499e-826f-ed6134bb31b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22948", "description": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22948", "source_name": "cve", "external_id": "CVE-2022-22948"}]}, {"type": "relationship", "id": "relationship--eb11887d-e3fc-4127-956c-ecaeacce477d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--60f275fb-8f87-499e-826f-ed6134bb31b8", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--55e86af5-ab80-41f0-aa9e-a5f295738c84", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--60f275fb-8f87-499e-826f-ed6134bb31b8", "target_ref": "attack-pattern--9c306d8d-cde7-4b4c-b6e8-d0bb16caca36"}, {"type": "vulnerability", "id": "vulnerability--eac91112-7fe6-4d3d-b07e-41bc88432e45", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-5591", "description": "Fortinet FortiOS Default Configuration Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5591", "source_name": "cve", "external_id": "CVE-2019-5591"}]}, {"type": "relationship", "id": "relationship--650591f4-eb82-4316-8fe0-b733a528b1a3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--eac91112-7fe6-4d3d-b07e-41bc88432e45", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--a0ee7791-cf48-44ed-b59e-3a23293c02de", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--eac91112-7fe6-4d3d-b07e-41bc88432e45", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "relationship", "id": "relationship--34124ada-fa50-473a-bdc8-f4a5ee57f3fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--eac91112-7fe6-4d3d-b07e-41bc88432e45", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4577", "description": "PHP-CGI OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4577", "source_name": "cve", "external_id": "CVE-2024-4577"}]}, {"type": "relationship", "id": "relationship--67f9b55c-ff7b-4830-9c47-a25272846810", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4492a291-072d-4988-9eed-037c4c90ea23", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--160dc87f-0385-461e-ae00-7a04b41eab78", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "relationship", "id": "relationship--02f5268d-ad4d-47e3-819b-ac625ab0072f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--35dd844a-b219-4e2b-a6bb-efa9a75995a9"}, {"type": "relationship", "id": "relationship--5efeec38-c356-4e24-a2d2-3f17ce8d15ff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--88827c12-055c-47f5-b677-e161d219919d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--03d7999c-1f4c-42cc-8373-e7690d318104"}, {"type": "relationship", "id": "relationship--ee823b99-e426-4e45-a693-dcf92cd66041", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--5e4bb662-e939-4165-bb74-400a1e970db2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--99ca3583-33d4-4b03-97d1-6d5b4d718f16", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--bf90d72c-c00b-45e3-b3aa-68560560d4c5"}, {"type": "relationship", "id": "relationship--e9d9e779-44ff-4d8d-870a-4450ca509583", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--8c68e7b2-a16d-4161-9ac5-80f6622ea924", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--65f2d882-3f41-4d48-8a06-29af77ec9f90"}, {"type": "relationship", "id": "relationship--bfe8e9df-9ad1-45c7-93cf-59db34d8c24c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--15ed7f74-88f4-413c-bcba-33ec081ade95", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "vulnerability", "id": "vulnerability--4b587551-544a-4fdd-a0ca-a853d909a5d4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-21887", "description": "Ivanti Connect Secure and Policy Secure Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21887", "source_name": "cve", "external_id": "CVE-2024-21887"}]}, {"type": "relationship", "id": "relationship--90dc483f-9c85-40e0-8bd5-20815f334014", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b587551-544a-4fdd-a0ca-a853d909a5d4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--658ef81b-9d7e-437f-b170-cdd7c021aff8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b587551-544a-4fdd-a0ca-a853d909a5d4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ace51aad-70df-45ae-bce3-81a59f9891f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4b587551-544a-4fdd-a0ca-a853d909a5d4", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--8b3f2c61-f0a3-42a4-a0ab-444d26711c1a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4b587551-544a-4fdd-a0ca-a853d909a5d4", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "vulnerability", "id": "vulnerability--9efbcf92-8c08-42dc-b351-83a9b94775f7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-20399", "description": "Cisco NX-OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20399", "source_name": "cve", "external_id": "CVE-2024-20399"}]}, {"type": "relationship", "id": "relationship--f914b000-1b61-48b2-9d23-e149a1513542", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9efbcf92-8c08-42dc-b351-83a9b94775f7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--dd33588c-c782-47a5-bf12-20f255e0b259", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9efbcf92-8c08-42dc-b351-83a9b94775f7", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--3e4a9536-57f0-4bec-8817-d3d56efeff5e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-49897", "description": "FXC AE1021, AE1021PE OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49897", "source_name": "cve", "external_id": "CVE-2023-49897"}]}, {"type": "relationship", "id": "relationship--8c958f5b-0b56-4b4a-9cb1-3582881b136c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3e4a9536-57f0-4bec-8817-d3d56efeff5e", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--228583a6-8e3a-466f-9b8c-1ce95ddaaa57", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3e4a9536-57f0-4bec-8817-d3d56efeff5e", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--9596b245-0f4d-45e5-b232-2c2da1fa208f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3e4a9536-57f0-4bec-8817-d3d56efeff5e", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "vulnerability", "id": "vulnerability--97b8ec1c-c47c-4f2b-853a-e581aaf3a656", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-47565", "description": "QNAP VioStor NVR OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47565", "source_name": "cve", "external_id": "CVE-2023-47565"}]}, {"type": "relationship", "id": "relationship--09f66bb3-646e-42da-b368-6eaa64d99516", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--97b8ec1c-c47c-4f2b-853a-e581aaf3a656", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--6cf73f7f-6668-4867-b7b5-12f7957c22a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--97b8ec1c-c47c-4f2b-853a-e581aaf3a656", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--ff6724d1-b202-46b0-aba3-d941ae8a22f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--97b8ec1c-c47c-4f2b-853a-e581aaf3a656", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "vulnerability", "id": "vulnerability--51f590bc-3d86-457d-867e-8e83352a24d3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20887", "description": "Vmware Aria Operations for Networks Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20887", "source_name": "cve", "external_id": "CVE-2023-20887"}]}, {"type": "relationship", "id": "relationship--6dde7935-19de-401b-955b-ab82dd4e40aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--51f590bc-3d86-457d-867e-8e83352a24d3", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--664f3a0a-fac3-4c58-a7b6-910018ed0f95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--51f590bc-3d86-457d-867e-8e83352a24d3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--f9181430-8956-48ca-8508-dbe497457604", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20273", "description": "Cisco IOS XE Web UI Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20273", "source_name": "cve", "external_id": "CVE-2023-20273"}]}, {"type": "relationship", "id": "relationship--44f3fa33-ac10-4ed6-84ed-eeb8db0476a4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f9181430-8956-48ca-8508-dbe497457604", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--8fb25362-7183-4abe-a6ba-30d79cf2aaf3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f9181430-8956-48ca-8508-dbe497457604", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--48f4fd5e-357f-407c-8fa7-2f847f273cc9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f9181430-8956-48ca-8508-dbe497457604", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-1389", "description": "TP-Link Archer AX-21 Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1389", "source_name": "cve", "external_id": "CVE-2023-1389"}]}, {"type": "relationship", "id": "relationship--17e03718-8397-4680-99d0-08556e60b7e4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--3202b3fa-21b7-4a2c-9625-813dcfa8aac2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--68e57c68-819f-4b36-ad75-cf229db4c20f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "relationship", "id": "relationship--c58cc53a-c716-415a-822a-9afffcc284c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--b5eb9401-99c7-4ea6-b637-789fd2a734c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4dacceb1-9c45-48d8-8211-b407488cceb3", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "vulnerability", "id": "vulnerability--d9222278-ed69-4e63-af28-449b12e88536", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-36804", "description": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36804", "source_name": "cve", "external_id": "CVE-2022-36804"}]}, {"type": "relationship", "id": "relationship--26a61374-eac3-46ff-bbd9-3ee75ca44044", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d9222278-ed69-4e63-af28-449b12e88536", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b80f3601-eaf9-49bc-95ed-525db8dc2744", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d9222278-ed69-4e63-af28-449b12e88536", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--73284f9f-6cef-494d-89f6-cca511da0c15", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-29303", "description": "SolarView Compact Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29303", "source_name": "cve", "external_id": "CVE-2022-29303"}]}, {"type": "relationship", "id": "relationship--59aac034-832e-4322-a52f-4f01eff284c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--73284f9f-6cef-494d-89f6-cca511da0c15", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--cf09b01b-982f-4192-8301-76826bf03c13", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--73284f9f-6cef-494d-89f6-cca511da0c15", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e4186917-a6d9-4ac6-988c-124b1d1545d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--73284f9f-6cef-494d-89f6-cca511da0c15", "target_ref": "attack-pattern--d456de47-a16f-4e46-8980-e67478a12dcb"}, {"type": "vulnerability", "id": "vulnerability--fb36b5e5-34b9-4146-a647-05454064471d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27104", "description": "Accellion FTA OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27104", "source_name": "cve", "external_id": "CVE-2021-27104"}]}, {"type": "relationship", "id": "relationship--62c2f273-df45-4424-8c24-6e509ddd59b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fb36b5e5-34b9-4146-a647-05454064471d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--fe0c100a-4f40-4249-8243-f538f333dbcc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fb36b5e5-34b9-4146-a647-05454064471d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b90914c0-a8c2-4f86-9185-aae0e4692a06", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fb36b5e5-34b9-4146-a647-05454064471d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--c7b4b9ef-8591-45ca-9ffa-6c4221e0a0b7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27102", "description": "Accellion FTA OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27102", "source_name": "cve", "external_id": "CVE-2021-27102"}]}, {"type": "relationship", "id": "relationship--bf1e7058-c726-4e51-b327-30c29f51ee48", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c7b4b9ef-8591-45ca-9ffa-6c4221e0a0b7", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c36d6c36-2c4d-4340-9bc8-742042ecccbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c7b4b9ef-8591-45ca-9ffa-6c4221e0a0b7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0556a2e8-9444-429b-b31e-6699d6b45c47", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c7b4b9ef-8591-45ca-9ffa-6c4221e0a0b7", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--ff45eaad-9cf7-4e25-8632-755bef8978bd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22899", "description": "Ivanti Pulse Connect Secure Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22899", "source_name": "cve", "external_id": "CVE-2021-22899"}]}, {"type": "relationship", "id": "relationship--ae7cb450-7ac1-49b8-90bb-c81b19491d3e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ff45eaad-9cf7-4e25-8632-755bef8978bd", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--620584d6-e897-465d-a30f-41e0375394cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ff45eaad-9cf7-4e25-8632-755bef8978bd", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "vulnerability", "id": "vulnerability--31b8cac4-835a-41bf-a46b-c1ab5e69ef48", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-1498", "description": "Cisco HyperFlex HX Data Platform Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1498", "source_name": "cve", "external_id": "CVE-2021-1498"}]}, {"type": "relationship", "id": "relationship--78c808ea-fbdc-4d86-b4e8-eedda153675e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--31b8cac4-835a-41bf-a46b-c1ab5e69ef48", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--afc6954a-ebf1-442f-9550-d80a8c5c8402", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--31b8cac4-835a-41bf-a46b-c1ab5e69ef48", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--2a88b7f7-1680-4c76-b9e0-cc5f68a8de59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-1497", "description": "Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1497", "source_name": "cve", "external_id": "CVE-2021-1497"}]}, {"type": "relationship", "id": "relationship--5d3fd56b-64af-4881-8fc8-8e667aa29834", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2a88b7f7-1680-4c76-b9e0-cc5f68a8de59", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--49ad377b-087d-426f-b457-7b77b6f53fe0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2a88b7f7-1680-4c76-b9e0-cc5f68a8de59", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--81966cd4-408a-4c32-9b26-5f4631dc40c6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-25506", "description": "D-Link DNS-320 Device Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25506", "source_name": "cve", "external_id": "CVE-2020-25506"}]}, {"type": "relationship", "id": "relationship--71078b33-ea8a-45c6-8906-cdcc1f54931d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--81966cd4-408a-4c32-9b26-5f4631dc40c6", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f4b37e87-eed0-4992-824f-2e6eaeae7ce1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--81966cd4-408a-4c32-9b26-5f4631dc40c6", "target_ref": "attack-pattern--810d8072-afb6-4a56-9ee7-86379ac4a6f3"}, {"type": "relationship", "id": "relationship--3bf9eb42-72c7-47e9-8a55-fad03c2e0618", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--81966cd4-408a-4c32-9b26-5f4631dc40c6", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--3f5d3321-882c-49a6-9e5a-ae5fb5d84839", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-20337", "description": "Cisco Identity Services Engine Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20337", "source_name": "cve", "external_id": "CVE-2025-20337"}]}, {"type": "relationship", "id": "relationship--afc88c59-eb2c-4d3e-a7b2-6505f7b8fa65", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3f5d3321-882c-49a6-9e5a-ae5fb5d84839", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "relationship", "id": "relationship--beddbd12-1154-4c6f-919a-7cce06316c35", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3f5d3321-882c-49a6-9e5a-ae5fb5d84839", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--938463cd-5d3f-4209-bdfe-848599939eb7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-20281", "description": "Cisco Identity Services Engine Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-20281", "source_name": "cve", "external_id": "CVE-2025-20281"}]}, {"type": "relationship", "id": "relationship--48830742-0c5a-4d49-ac98-ca873cdf9ed2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--938463cd-5d3f-4209-bdfe-848599939eb7", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "relationship", "id": "relationship--11732a85-cb05-4b35-8c59-bda85b5db2fa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--938463cd-5d3f-4209-bdfe-848599939eb7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--22f29551-c748-4df7-9758-c7c88787fa44", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-6047", "description": "GeoVision Devices OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6047", "source_name": "cve", "external_id": "CVE-2024-6047"}]}, {"type": "relationship", "id": "relationship--6437bdf2-2cb4-4da8-9231-f9fbd6f0bd8a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--22f29551-c748-4df7-9758-c7c88787fa44", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--4609c76d-ec64-4c65-b318-363115d3877f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--22f29551-c748-4df7-9758-c7c88787fa44", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d6ab5029-912a-41bf-946d-7eaa9288551f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-50603", "description": "Aviatrix Controllers OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50603", "source_name": "cve", "external_id": "CVE-2024-50603"}]}, {"type": "relationship", "id": "relationship--638aadec-2144-48fa-a802-fd3ebc6db3a9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d6ab5029-912a-41bf-946d-7eaa9288551f", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--f4dfbe15-4973-4a4a-8a2f-fad57712f1da", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d6ab5029-912a-41bf-946d-7eaa9288551f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--19a03c0c-0ff9-4b50-a9a8-effa39061db3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-41710", "description": "Mitel SIP Phones Argument Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41710", "source_name": "cve", "external_id": "CVE-2024-41710"}]}, {"type": "relationship", "id": "relationship--82f07813-9017-4fbf-b321-582417e9f8ce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--19a03c0c-0ff9-4b50-a9a8-effa39061db3", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--99ce8ce1-7c5e-4fed-9864-22f768288e64", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--19a03c0c-0ff9-4b50-a9a8-effa39061db3", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--56d0d4d0-cffc-477e-8eb3-34541467ea6f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-12987", "description": "DrayTek Vigor Routers OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12987", "source_name": "cve", "external_id": "CVE-2024-12987"}]}, {"type": "relationship", "id": "relationship--dd738acf-313b-48d8-a955-a0004a0f25c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--56d0d4d0-cffc-477e-8eb3-34541467ea6f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--24e1bfb0-0855-42cd-9e21-6317d6ffe2d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--56d0d4d0-cffc-477e-8eb3-34541467ea6f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4b8ba6b1-40bb-4084-87ed-7d53b56104ed", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-11120", "description": "GeoVision Devices OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11120", "source_name": "cve", "external_id": "CVE-2024-11120"}]}, {"type": "relationship", "id": "relationship--a5cd7414-f2c2-4f7c-88a8-5e10321bc724", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b8ba6b1-40bb-4084-87ed-7d53b56104ed", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--1c66e3f2-0e2d-44bf-ab69-f68be7676c7f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b8ba6b1-40bb-4084-87ed-7d53b56104ed", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--86a105f7-afe8-476b-9fde-818156f26abd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b8ba6b1-40bb-4084-87ed-7d53b56104ed", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "vulnerability", "id": "vulnerability--8e46a218-594c-4520-939c-556444ded00c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-44221", "description": "SonicWall SMA100 Appliances OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44221", "source_name": "cve", "external_id": "CVE-2023-44221"}]}, {"type": "relationship", "id": "relationship--2d972ffc-89a1-40cb-911a-68a2987fa480", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e46a218-594c-4520-939c-556444ded00c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--861c88a4-328a-46ff-afd8-93fa4cf943a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e46a218-594c-4520-939c-556444ded00c", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "relationship", "id": "relationship--28314735-44bd-44f9-9bb2-9cfb16a5f3ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8e46a218-594c-4520-939c-556444ded00c", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--0b980e22-32a0-4ebb-aaef-2f89ae28e561", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8e46a218-594c-4520-939c-556444ded00c", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "vulnerability", "id": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-39780", "description": "ASUS RT-AX55 Routers OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39780", "source_name": "cve", "external_id": "CVE-2023-39780"}]}, {"type": "relationship", "id": "relationship--885f67f2-6a63-422a-8cf4-31b5518bcf17", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--67177be2-88e3-4b1b-b9ab-f095a8bef404", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--56575f49-02fe-4197-a7c2-4075529c2f23", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "target_ref": "attack-pattern--ce0687a0-e692-4b77-964a-0784a8e54ff1"}, {"type": "relationship", "id": "relationship--33de2419-5c1e-4ea3-a690-f16f54bf049e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--8799f202-4651-455b-8f1a-846d9cd58066", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3852225c-75cd-458a-b6b4-4c59950472ea", "target_ref": "attack-pattern--2db31dcd-54da-405d-acef-b9129b816ed6"}, {"type": "vulnerability", "id": "vulnerability--37ae98ef-1617-48ea-b5ce-314f17009b75", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-33538", "description": "TP-Link Multiple Routers Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33538", "source_name": "cve", "external_id": "CVE-2023-33538"}]}, {"type": "relationship", "id": "relationship--47fe058f-4763-42c6-b3fa-8f7825cfb1fb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--37ae98ef-1617-48ea-b5ce-314f17009b75", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--1c89436a-8e9c-4507-8c62-4678a9c706b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--37ae98ef-1617-48ea-b5ce-314f17009b75", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--da36a90e-62fa-4425-94cd-ce906b1d0542", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-20035", "description": "SonicWall SMA100 Appliances OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20035", "source_name": "cve", "external_id": "CVE-2021-20035"}]}, {"type": "relationship", "id": "relationship--ccb2e74e-f776-4d84-8575-1e01d32d7a66", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--da36a90e-62fa-4425-94cd-ce906b1d0542", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--ddf6ad6b-5207-4189-af4f-9971f66974c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--da36a90e-62fa-4425-94cd-ce906b1d0542", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--f85ca7e9-935b-4bdd-957d-27a393a996e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-33246", "description": "Apache RocketMQ Command Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33246", "source_name": "cve", "external_id": "CVE-2023-33246"}]}, {"type": "relationship", "id": "relationship--b7ba6d23-5169-4a97-a843-aa786a32907e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f85ca7e9-935b-4bdd-957d-27a393a996e5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--69ea351f-0263-4af7-b784-316bb7e993e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f85ca7e9-935b-4bdd-957d-27a393a996e5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--efb1acd9-3b25-47bf-9de8-1dcb87378376", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f85ca7e9-935b-4bdd-957d-27a393a996e5", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "vulnerability", "id": "vulnerability--36d3389d-3f1c-49ef-a4c0-34dbed9cc8a9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-42237", "description": "Sitecore XP Remote Command Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42237", "source_name": "cve", "external_id": "CVE-2021-42237"}]}, {"type": "relationship", "id": "relationship--99790e27-7663-480c-95bb-2301737032ce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--36d3389d-3f1c-49ef-a4c0-34dbed9cc8a9", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--31b9a8f1-6b09-4e3c-ac2f-d1a0a0526870", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-1316", "description": "Edimax IC-7100 IP Camera OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1316", "source_name": "cve", "external_id": "CVE-2025-1316"}]}, {"type": "relationship", "id": "relationship--64e1dcbf-7823-4e1e-8343-bc022483f0b0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--31b9a8f1-6b09-4e3c-ac2f-d1a0a0526870", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--04e5d93c-deee-43cc-8e6b-4c8bfd397f7c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--31b9a8f1-6b09-4e3c-ac2f-d1a0a0526870", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "vulnerability", "id": "vulnerability--e84feeef-a0c3-4762-ab45-4612f11d80d4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-40891", "description": "Zyxel DSL CPE OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40891", "source_name": "cve", "external_id": "CVE-2024-40891"}]}, {"type": "relationship", "id": "relationship--21e5fd4b-fb11-4387-9373-be35f89a4afc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e84feeef-a0c3-4762-ab45-4612f11d80d4", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--e5c4c828-1f7f-4b35-9844-895917b81d5e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e84feeef-a0c3-4762-ab45-4612f11d80d4", "target_ref": "attack-pattern--51ea26b1-ff1e-4faa-b1a0-1114cd298c87"}, {"type": "vulnerability", "id": "vulnerability--22fac256-d715-4555-b03b-c899cbe6fd01", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-40890", "description": "Zyxel DSL CPE OS Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40890", "source_name": "cve", "external_id": "CVE-2024-40890"}]}, {"type": "relationship", "id": "relationship--7481aff3-2172-4629-9116-b71f8f67a101", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--22fac256-d715-4555-b03b-c899cbe6fd01", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--ad1e3025-aaef-4174-8345-35d2d71b1dd9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--22fac256-d715-4555-b03b-c899cbe6fd01", "target_ref": "attack-pattern--51ea26b1-ff1e-4faa-b1a0-1114cd298c87"}, {"type": "vulnerability", "id": "vulnerability--972ba400-b2f9-44c2-a471-d5a1b07ee400", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-7024", "description": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7024", "source_name": "cve", "external_id": "CVE-2023-7024"}]}, {"type": "relationship", "id": "relationship--8d7846d9-2113-48c6-aae9-140bcbda1d6f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--972ba400-b2f9-44c2-a471-d5a1b07ee400", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--82655a58-8a7d-4e59-92a5-69cec0e619e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--972ba400-b2f9-44c2-a471-d5a1b07ee400", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--c5553461-f62d-480a-943b-a545f109572a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-6549", "description": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6549", "source_name": "cve", "external_id": "CVE-2023-6549"}]}, {"type": "relationship", "id": "relationship--ae958d64-c918-4b0f-a38b-d3c2fde74af7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c5553461-f62d-480a-943b-a545f109572a", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--0383609e-cb2d-4723-bd2f-90b7cc8b2988", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c5553461-f62d-480a-943b-a545f109572a", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--3bcb4bde-78b4-4ccd-958c-3b160b50d17a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-5217", "description": "Google Chromium libvpx Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217", "source_name": "cve", "external_id": "CVE-2023-5217"}]}, {"type": "relationship", "id": "relationship--ac83811e-abbf-490f-b818-79d1f57b8ce9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3bcb4bde-78b4-4ccd-958c-3b160b50d17a", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--4d5c1640-1676-4e71-aeea-924bcf1acdf5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3bcb4bde-78b4-4ccd-958c-3b160b50d17a", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--49ff8e7a-6d4b-43d1-a68d-980346e6dc6d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-4966", "description": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4966", "source_name": "cve", "external_id": "CVE-2023-4966"}]}, {"type": "relationship", "id": "relationship--cdc2d732-6e02-4531-9c68-9b0058ed949d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49ff8e7a-6d4b-43d1-a68d-980346e6dc6d", "target_ref": "attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d"}, {"type": "relationship", "id": "relationship--a1d23cc0-40d2-4deb-b1cc-bae677da9426", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--49ff8e7a-6d4b-43d1-a68d-980346e6dc6d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--d486083c-66b4-4a5b-ac0c-066de4856612", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--49ff8e7a-6d4b-43d1-a68d-980346e6dc6d", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--b574fbe4-8adf-4f9f-a522-39885e153a52", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-27997", "description": "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27997", "source_name": "cve", "external_id": "CVE-2023-27997"}]}, {"type": "relationship", "id": "relationship--5ff5a79c-8987-4116-8104-1a71bd837ae7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b574fbe4-8adf-4f9f-a522-39885e153a52", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b93b3da3-b913-4d1f-ba04-8787199d9dca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b574fbe4-8adf-4f9f-a522-39885e153a52", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--ef010f35-cd1e-4542-9395-f6c1770dd31f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b574fbe4-8adf-4f9f-a522-39885e153a52", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--efc0dcb8-d514-4efc-b43d-c9a3ffcf08c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-42475", "description": "Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42475", "source_name": "cve", "external_id": "CVE-2022-42475"}]}, {"type": "relationship", "id": "relationship--14ebda9e-b247-49da-86ae-38f4d813ce0f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--efc0dcb8-d514-4efc-b43d-c9a3ffcf08c8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f4e2a77e-8284-47f7-9ed5-223de9239986", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--efc0dcb8-d514-4efc-b43d-c9a3ffcf08c8", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--403b6d80-eff9-4435-bea3-90271e611a04", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--efc0dcb8-d514-4efc-b43d-c9a3ffcf08c8", "target_ref": "attack-pattern--e4dc8c01-417f-458d-9ee0-bb0617c1b391"}, {"type": "relationship", "id": "relationship--c8ed24ba-6c1e-4356-9547-e5c540cb2f29", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--efc0dcb8-d514-4efc-b43d-c9a3ffcf08c8", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--85ac637c-2fca-4687-9120-4686af373343", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20708", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20708", "source_name": "cve", "external_id": "CVE-2022-20708"}]}, {"type": "relationship", "id": "relationship--a9879c9e-8e98-458e-b756-b8b7f0149af9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--85ac637c-2fca-4687-9120-4686af373343", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--55955fec-01d5-411e-88df-fb548b6674ea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--85ac637c-2fca-4687-9120-4686af373343", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--fcc72014-d2c7-4f56-aa29-472d6eabbb03", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20703", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20703", "source_name": "cve", "external_id": "CVE-2022-20703"}]}, {"type": "relationship", "id": "relationship--2ab765e6-7d3a-4139-87bb-60881c5aedef", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fcc72014-d2c7-4f56-aa29-472d6eabbb03", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--0f5a1760-3905-4cf1-b990-cb2d6fb2bf98", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20701", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20701", "source_name": "cve", "external_id": "CVE-2022-20701"}]}, {"type": "relationship", "id": "relationship--1c1b3a6f-3118-4136-bd5d-0074127304c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0f5a1760-3905-4cf1-b990-cb2d6fb2bf98", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--4610abdf-3c38-4a29-8311-8058613249db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0f5a1760-3905-4cf1-b990-cb2d6fb2bf98", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--3925ba49-61e5-4f4b-8439-e5ea2d7db684", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20700", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20700", "source_name": "cve", "external_id": "CVE-2022-20700"}]}, {"type": "relationship", "id": "relationship--26b4afb5-7f2c-48bc-bfce-eb85a5fb8cd4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3925ba49-61e5-4f4b-8439-e5ea2d7db684", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--9338d4e9-7683-4666-b0b2-b9b2356b52ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3925ba49-61e5-4f4b-8439-e5ea2d7db684", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--28e3b85a-8cbd-4df6-9bfe-990cc50bb4a4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-20699", "description": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20699", "source_name": "cve", "external_id": "CVE-2022-20699"}]}, {"type": "relationship", "id": "relationship--b92c8e75-010e-4b29-8165-bd0547ca6075", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--28e3b85a-8cbd-4df6-9bfe-990cc50bb4a4", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--d735ff8f-fa64-48c2-9d53-866b47e1a8a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--28e3b85a-8cbd-4df6-9bfe-990cc50bb4a4", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--b33491ab-a45e-4031-b3df-500822cc1b0d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22894", "description": "Ivanti Pulse Connect Secure Collaboration Suite Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22894", "source_name": "cve", "external_id": "CVE-2021-22894"}]}, {"type": "relationship", "id": "relationship--a8f50427-20af-47f7-a620-2a52c9d70757", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b33491ab-a45e-4031-b3df-500822cc1b0d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--814acd56-5148-459f-9e48-8527077e7840", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b33491ab-a45e-4031-b3df-500822cc1b0d", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--828874d0-f65b-4a27-8c55-a12f2f73e462", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21148", "description": "Google Chromium V8 Heap Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21148", "source_name": "cve", "external_id": "CVE-2021-21148"}]}, {"type": "relationship", "id": "relationship--e2d33942-1ef5-443e-b3e9-b55f5d5df55e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--828874d0-f65b-4a27-8c55-a12f2f73e462", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--4268728d-6a31-4104-9c92-48d7b62f54aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--828874d0-f65b-4a27-8c55-a12f2f73e462", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--1c8145e2-004e-4f96-a716-d3ae46c23ccc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21017", "description": "Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21017", "source_name": "cve", "external_id": "CVE-2021-21017"}]}, {"type": "relationship", "id": "relationship--b04970d9-7f2d-46aa-b37a-1fbb803e496a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1c8145e2-004e-4f96-a716-d3ae46c23ccc", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--55f57272-d9f4-44d1-a2b3-0ed05ba9a0f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-5735", "description": "Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5735", "source_name": "cve", "external_id": "CVE-2020-5735"}]}, {"type": "relationship", "id": "relationship--68e3c9ca-a834-462a-9a96-d40450a6a2d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--55f57272-d9f4-44d1-a2b3-0ed05ba9a0f9", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--94ae42fd-4889-4844-be02-c8d00d107f08", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--55f57272-d9f4-44d1-a2b3-0ed05ba9a0f9", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "vulnerability", "id": "vulnerability--d53e8829-f822-4e62-a487-771ca7eff1c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-29557", "description": "D-Link DIR-825 R1 Devices Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29557", "source_name": "cve", "external_id": "CVE-2020-29557"}]}, {"type": "relationship", "id": "relationship--c27bd8fb-556e-4354-b574-ea6d121a95ac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d53e8829-f822-4e62-a487-771ca7eff1c8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d6af1435-f347-474e-acf7-58c0e33f4d1c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d53e8829-f822-4e62-a487-771ca7eff1c8", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e18f5898-28ae-4828-b16d-9a902b6c87ea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d53e8829-f822-4e62-a487-771ca7eff1c8", "target_ref": "attack-pattern--810d8072-afb6-4a56-9ee7-86379ac4a6f3"}, {"type": "vulnerability", "id": "vulnerability--da87f145-c71c-48d5-94fc-116f6d17e154", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-6789", "description": "Exim Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6789", "source_name": "cve", "external_id": "CVE-2018-6789"}]}, {"type": "relationship", "id": "relationship--d5725ee5-92a2-4555-8fd5-c483d3351107", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--da87f145-c71c-48d5-94fc-116f6d17e154", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0d2a4c64-c799-48fa-a724-71e3427a2f88", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--da87f145-c71c-48d5-94fc-116f6d17e154", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--6107578f-95a3-4c00-8519-692a92e1d5cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-3113", "description": "Adobe Flash Player Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3113", "source_name": "cve", "external_id": "CVE-2015-3113"}]}, {"type": "relationship", "id": "relationship--c77fe05f-41ef-41e4-bb07-ac30d1d77f66", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6107578f-95a3-4c00-8519-692a92e1d5cb", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--2f548d4c-a0b5-49c3-8129-dafdda1b147a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6107578f-95a3-4c00-8519-692a92e1d5cb", "target_ref": "attack-pattern--e4dc8c01-417f-458d-9ee0-bb0617c1b391"}, {"type": "relationship", "id": "relationship--e609dcf2-b20d-4be3-b731-f25dca8fe832", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6107578f-95a3-4c00-8519-692a92e1d5cb", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "relationship", "id": "relationship--69213759-aa45-491e-afc0-1a57af472a23", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6107578f-95a3-4c00-8519-692a92e1d5cb", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "vulnerability", "id": "vulnerability--fc308fd2-6ec3-4c80-a61d-05b9a4fe8dc7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0641", "description": "Adobe Reader Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0641", "source_name": "cve", "external_id": "CVE-2013-0641"}]}, {"type": "relationship", "id": "relationship--bfe7d087-b42a-4691-aa7a-24e40fa7b9b7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fc308fd2-6ec3-4c80-a61d-05b9a4fe8dc7", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--fef28a1f-75d3-4209-bb1b-cbcf1a54e0d4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--fc308fd2-6ec3-4c80-a61d-05b9a4fe8dc7", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "relationship", "id": "relationship--c63c62de-8e7e-4c48-a120-4119b0297806", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fc308fd2-6ec3-4c80-a61d-05b9a4fe8dc7", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--da8eb9cb-3cd0-4da6-8eaf-74f38b6ce841", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2010-2883", "description": "Adobe Acrobat and Reader Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2883", "source_name": "cve", "external_id": "CVE-2010-2883"}]}, {"type": "relationship", "id": "relationship--9a5809ef-84b8-4857-89a7-18417bc3e738", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--da8eb9cb-3cd0-4da6-8eaf-74f38b6ce841", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--d066f083-bea6-4e50-be48-dea5d93418f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--da8eb9cb-3cd0-4da6-8eaf-74f38b6ce841", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ee46b079-1a46-4f0a-bb39-eaad7e148291", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--da8eb9cb-3cd0-4da6-8eaf-74f38b6ce841", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "vulnerability", "id": "vulnerability--6b66f68c-9e66-41ec-92df-3d2c7778caf7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2007-5659", "description": "Adobe Acrobat and Reader Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", "source_name": "cve", "external_id": "CVE-2007-5659"}]}, {"type": "relationship", "id": "relationship--631c93d8-202c-4ebf-8e41-8b6e82c7d434", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6b66f68c-9e66-41ec-92df-3d2c7778caf7", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24993", "description": "Microsoft Windows NTFS Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24993", "source_name": "cve", "external_id": "CVE-2025-24993"}]}, {"type": "relationship", "id": "relationship--45329629-888b-4c1e-b014-ccfbc943b1ab", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--cf764659-9912-4fd8-9a49-1c455fed8e08", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "target_ref": "attack-pattern--8c32eb4d-805f-4fc5-bf60-c4d476c131b5"}, {"type": "relationship", "id": "relationship--c19ad39c-f6de-4efd-92ef-7de2b2e641f4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--a351cf6b-1749-4553-9f7b-51df8b9ba252", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--9081b899-f8ed-4cad-81f5-a8de4fb9c058", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--67275259-4f43-404f-b52a-3a343918ff5c", "target_ref": "attack-pattern--ac9e6b22-11bf-45d7-9181-c1cb08360931"}, {"type": "vulnerability", "id": "vulnerability--57c81f48-4935-45a1-95b4-81f5acc8e658", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21333", "description": "Microsoft Windows Hyper-V NT Kernel Integration VSP Heap-based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21333", "source_name": "cve", "external_id": "CVE-2025-21333"}]}, {"type": "relationship", "id": "relationship--10ca4024-34de-4f0d-888b-8490ef4bf250", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--57c81f48-4935-45a1-95b4-81f5acc8e658", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--d2d8c39e-4efe-4028-8148-49b02cbef6f7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--57c81f48-4935-45a1-95b4-81f5acc8e658", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--575262e9-b3e5-4c3e-a2e7-0d7001c54501", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21418", "description": "Microsoft Windows Ancillary Function Driver for WinSock Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21418", "source_name": "cve", "external_id": "CVE-2025-21418"}]}, {"type": "relationship", "id": "relationship--64b7df69-b841-43fb-9e21-fe4dab8585cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--575262e9-b3e5-4c3e-a2e7-0d7001c54501", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--95308f50-09ed-4125-b246-726e152b450f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--575262e9-b3e5-4c3e-a2e7-0d7001c54501", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--03280c41-2fa8-4d97-bad7-94afbd6bdc46", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--575262e9-b3e5-4c3e-a2e7-0d7001c54501", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--72301310-9dfd-4353-8e42-0b774221f569", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-22457", "description": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22457", "source_name": "cve", "external_id": "CVE-2025-22457"}]}, {"type": "relationship", "id": "relationship--ba508241-0ef8-4ae0-903b-b34faa3326ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--72301310-9dfd-4353-8e42-0b774221f569", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--1f0957f4-d9e0-47b7-9971-948517f3552d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--72301310-9dfd-4353-8e42-0b774221f569", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-0282", "description": "Ivanti Connect Secure, Policy Secure, and ZTA Gateways Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0282", "source_name": "cve", "external_id": "CVE-2025-0282"}]}, {"type": "relationship", "id": "relationship--1c2b4ea6-5c54-4d6d-ad94-80b2152e0eee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--67073dde-d720-45ae-83da-b12d5e73ca3b"}, {"type": "relationship", "id": "relationship--e544d05d-4cab-40e0-9128-6b487a84124d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d04c9f7a-ef43-4ad9-a4d5-7207714f522a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--228bcdab-e01c-4fe3-b499-4925550db1b6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--c65002c0-4e39-494a-b766-a8e9df93b4a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--553fad3f-3b1e-48fa-90b7-3f856a7511eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9776a80d-5600-45a9-a5c0-3d2ca7b711e8", "target_ref": "attack-pattern--e358d692-23c0-4a31-9eb6-ecc13a8d7735"}, {"type": "vulnerability", "id": "vulnerability--bf6c041a-e851-40df-bc8f-d718544b72c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-6543", "description": "Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6543", "source_name": "cve", "external_id": "CVE-2025-6543"}]}, {"type": "relationship", "id": "relationship--5d685d90-b34b-4851-8e70-d9c4310c61c9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bf6c041a-e851-40df-bc8f-d718544b72c5", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--1975912c-a27e-4e82-ae36-b7f6da1b968d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bf6c041a-e851-40df-bc8f-d718544b72c5", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--3bcfe401-d064-4b8e-a476-6fb55811b2dc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--bf6c041a-e851-40df-bc8f-d718544b72c5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d1c7732a-a645-475e-aa40-9468f4b200c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-42599", "description": "Qualitia Active! Mail Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-42599", "source_name": "cve", "external_id": "CVE-2025-42599"}]}, {"type": "relationship", "id": "relationship--8d303068-6410-4a4c-b279-02200949d6db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d1c7732a-a645-475e-aa40-9468f4b200c8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--a9d41c6e-19b0-4129-af5e-2700e2c852f7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d1c7732a-a645-475e-aa40-9468f4b200c8", "target_ref": "attack-pattern--2b5aa86b-a0df-4382-848d-30abea443327"}, {"type": "relationship", "id": "relationship--c9e2eeb0-c55e-4ebe-8e47-554cda8e37d3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d1c7732a-a645-475e-aa40-9468f4b200c8", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--aa91a567-aea3-4c65-bd2a-9588cc3ef6e3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d1c7732a-a645-475e-aa40-9468f4b200c8", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "vulnerability", "id": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-32756", "description": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32756", "source_name": "cve", "external_id": "CVE-2025-32756"}]}, {"type": "relationship", "id": "relationship--a69d6832-4c5f-484b-a71a-815a55deb8b2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--cf63d981-0705-4942-adc7-4cd94e77fd94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ab42fa97-283b-42a9-a994-2b8f097efd54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--7958f6d0-2944-4574-b507-25804b2b4b82", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--d193d6da-0db6-4d82-aece-077e1bd239d2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--699693fc-de5f-4267-8304-c723655e2f67", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--97266eaa-3514-4233-b5d3-ec920d783422", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c854c20-bf0e-460c-b7cc-e92a4212cdfe", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "vulnerability", "id": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-32706", "description": "Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32706", "source_name": "cve", "external_id": "CVE-2025-32706"}]}, {"type": "relationship", "id": "relationship--607eb7ef-5ff3-4891-b20d-140e30303e33", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--7a23232d-3c08-44dc-b048-5a5fcb445135", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3530da96-06ed-455a-892b-c6205098a33c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--325610c8-f6d0-4bbc-84d4-55ca4f0e6c82", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "target_ref": "attack-pattern--65f2d882-3f41-4d48-8a06-29af77ec9f90"}, {"type": "relationship", "id": "relationship--c21f94b1-fb5a-47a7-992e-13fc62668eec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6b084cd7-85f3-408b-93e3-0870a66f4347", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "vulnerability", "id": "vulnerability--cf5ffa03-747a-4b02-babc-7bdcd737eb85", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-7101", "description": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7101", "source_name": "cve", "external_id": "CVE-2023-7101"}]}, {"type": "relationship", "id": "relationship--994b6a66-1fc3-4b5f-a57a-761dd9a3c505", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cf5ffa03-747a-4b02-babc-7bdcd737eb85", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--54cb1ccd-fb27-4d69-81df-435300f7bbaa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cf5ffa03-747a-4b02-babc-7bdcd737eb85", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c59e6582-73d4-48dd-b762-ce4e6162f869", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cf5ffa03-747a-4b02-babc-7bdcd737eb85", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--b73fdcc4-58e1-407f-9314-9116cecc24f7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-41179", "description": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41179", "source_name": "cve", "external_id": "CVE-2023-41179"}]}, {"type": "relationship", "id": "relationship--57499295-6a11-44fd-a075-891451c010f0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b73fdcc4-58e1-407f-9314-9116cecc24f7", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--c9afb518-778c-4be5-89bd-877bf9df25df", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b73fdcc4-58e1-407f-9314-9116cecc24f7", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-38831", "description": "RARLAB WinRAR Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38831", "source_name": "cve", "external_id": "CVE-2023-38831"}]}, {"type": "relationship", "id": "relationship--0efdd24a-5244-41fe-82b9-d2ea2e47e3ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--8c32eb4d-805f-4fc5-bf60-c4d476c131b5"}, {"type": "relationship", "id": "relationship--42e01047-9b0b-4a92-851e-ea4b17d649d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--04f9d2bf-9570-4eb5-9a4d-e740bc6a2414", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--57340c81-c025-4189-8fa0-fc7ede51bae4"}, {"type": "relationship", "id": "relationship--aba7c839-c745-473c-a820-ad5c215d3e53", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--35dd844a-b219-4e2b-a6bb-efa9a75995a9"}, {"type": "relationship", "id": "relationship--c850967f-a530-4dbc-9f79-158cc662210f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--e01bb3c4-e7de-455b-8e7b-f00a29ca1efa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--fb73323b-c6de-4c70-ad31-9f22ed991017", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--378ebfa9-a87c-44cc-8e61-d748efd5c639", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0434184b-74a8-43b0-a494-8e209f729189", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36884", "description": "Microsoft Windows Search Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36884", "source_name": "cve", "external_id": "CVE-2023-36884"}]}, {"type": "relationship", "id": "relationship--984ebd83-1a7a-4466-ad81-8899c650cc07", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--220119da-d500-4a13-b1a4-5bb574d17381", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--20fb2507-d71c-455d-9b6d-6104461cf26b"}, {"type": "relationship", "id": "relationship--66ae65f2-5bd3-40b9-b2f7-1383b1a3bdf1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--f5d8eed6-48a9-4cdf-a3d7-d1ffa99c3d2a"}, {"type": "relationship", "id": "relationship--0911e8c0-1c32-46ed-9dd0-942abe3fae6d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--3a93e8b2-cf41-47b1-b63b-500c001f7fe7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--4513cd2a-905a-4221-a052-7a73c5310302", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--0b52579f-052a-4a0e-b365-0dbbed22514c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--6495ae23-3ab4-43c5-a94f-5638a2c31fd2"}, {"type": "relationship", "id": "relationship--ead81e6e-1bc6-41d9-a1d0-fdc3893dc474", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--11656d95-4c20-413c-be83-d76a7d1f7dba", "target_ref": "attack-pattern--7e7c2fba-7cca-486c-9582-4c1bb2851961"}, {"type": "vulnerability", "id": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-22952", "description": "Multiple SugarCRM Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22952", "source_name": "cve", "external_id": "CVE-2023-22952"}]}, {"type": "relationship", "id": "relationship--5ab0029a-6ba6-458e-8ff8-d8507546c643", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--92d6d3ea-0364-444a-84b3-2502f0d501b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--3298ce88-1628-43b1-87d9-0b5336b193d7"}, {"type": "relationship", "id": "relationship--bc645925-74f5-4d91-9d0d-12d32278abcb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--b7cf9119-868b-4a77-88b4-cc94cc3172b5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--36ca0c6a-fe8a-4046-b9de-d890c113cca7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--eb062747-2193-45de-8fa2-e62549c37ddf"}, {"type": "relationship", "id": "relationship--dc8fa0fb-b154-4c70-963b-e81e2b28d0c1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--767dbf9e-df3f-45cb-8998-4903ab5f80c0"}, {"type": "relationship", "id": "relationship--601ac305-3828-44d9-9fcc-d89948a9c838", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--2324c7a3-af26-4f6f-b4cf-9a9a2cba8e6e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--ac08589e-ee59-4935-8667-d845e38fe579"}, {"type": "relationship", "id": "relationship--78df6d57-f6bb-4c0f-9e43-5cb22c02997b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--fe9194a7-8c44-4096-bdcd-bef84989cee9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5da01d93-9b74-47e1-b9cb-8510105cab88", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--c125d569-6061-48eb-b7d1-0bfa9975fe78", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-0669", "description": "Fortra GoAnywhere MFT Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0669", "source_name": "cve", "external_id": "CVE-2023-0669"}]}, {"type": "relationship", "id": "relationship--c1c2577d-3f79-4ccf-b4d3-b85a262e86b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c125d569-6061-48eb-b7d1-0bfa9975fe78", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--1b930a91-5473-4c94-bb8f-d62896b3d3a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c125d569-6061-48eb-b7d1-0bfa9975fe78", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--67d9fb6f-20ab-49f7-a0f2-5b0c571c6070", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c125d569-6061-48eb-b7d1-0bfa9975fe78", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "vulnerability", "id": "vulnerability--5dc962c3-bc96-486a-a204-563b9750e81d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-47966", "description": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-47966", "source_name": "cve", "external_id": "CVE-2022-47966"}]}, {"type": "relationship", "id": "relationship--84ed17e0-daaa-4b35-8c43-87b2f4a5337c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5dc962c3-bc96-486a-a204-563b9750e81d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--e9b49246-8608-45af-b9eb-fc47e4f1f092", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5dc962c3-bc96-486a-a204-563b9750e81d", "target_ref": "attack-pattern--635cbe30-392d-4e27-978e-66774357c762"}, {"type": "relationship", "id": "relationship--84085bcb-f714-4ae5-8627-86517955dd25", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5dc962c3-bc96-486a-a204-563b9750e81d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--4f81ef05-6331-495b-b3a6-6acb7f8e19ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-42948", "description": "Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42948", "source_name": "cve", "external_id": "CVE-2022-42948"}]}, {"type": "relationship", "id": "relationship--532c80db-f5fb-4fd3-a613-f1901caee5bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4f81ef05-6331-495b-b3a6-6acb7f8e19ec", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--a245ef74-4935-42a7-a2ec-d545fc914652", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4f81ef05-6331-495b-b3a6-6acb7f8e19ec", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--2f1c1cdf-0cae-4f26-9b2b-96e15e5ac784", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41128", "description": "Microsoft Windows Scripting Languages Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41128", "source_name": "cve", "external_id": "CVE-2022-41128"}]}, {"type": "relationship", "id": "relationship--ea3076ed-00d0-488c-ae02-d6465833c353", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2f1c1cdf-0cae-4f26-9b2b-96e15e5ac784", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--b4f36c17-5e3d-4015-a8c6-77dee416a177", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2f1c1cdf-0cae-4f26-9b2b-96e15e5ac784", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--05699fd1-1a4a-4bac-86bd-535f153fe9ac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2f1c1cdf-0cae-4f26-9b2b-96e15e5ac784", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "vulnerability", "id": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41082", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41082", "source_name": "cve", "external_id": "CVE-2022-41082"}]}, {"type": "relationship", "id": "relationship--2b6a5aec-c97e-4940-b393-912eb85c7e85", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--3b840846-a697-4825-95af-bf12932746bb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--40597f16-0963-4249-bf4c-ac93b7fb9807"}, {"type": "relationship", "id": "relationship--795c756e-8af1-4a44-9d73-6d5cec110734", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--767dbf9e-df3f-45cb-8998-4903ab5f80c0"}, {"type": "relationship", "id": "relationship--347c2c13-a306-4c33-8cd6-df892a111531", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--1bfe28cc-c775-483e-8913-7f467ce18e94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--3c91da50-623a-49f8-83c3-19b2a5c87e44", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--970a3432-3237-47ad-bcca-7d8cbb217736"}, {"type": "relationship", "id": "relationship--0ab79c5e-8fe8-43b8-8209-6978ed54f120", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d3e14344-3ce5-4a1c-9289-2823d69afd34", "target_ref": "attack-pattern--970a3432-3237-47ad-bcca-7d8cbb217736"}, {"type": "vulnerability", "id": "vulnerability--a22a79ea-f9c2-42ae-b58e-9e21a7b87c76", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-35914", "description": "Teclib GLPI Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35914", "source_name": "cve", "external_id": "CVE-2022-35914"}]}, {"type": "relationship", "id": "relationship--2c06c231-041a-48b4-acc3-f56edd8c8500", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a22a79ea-f9c2-42ae-b58e-9e21a7b87c76", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b03210db-b4e9-44f2-a99b-d2977c6264cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a22a79ea-f9c2-42ae-b58e-9e21a7b87c76", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--f8355be7-f85c-48c2-b87f-0959cae97566", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-35405", "description": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35405", "source_name": "cve", "external_id": "CVE-2022-35405"}]}, {"type": "relationship", "id": "relationship--12557765-af07-4af8-8065-37a0dc56e997", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f8355be7-f85c-48c2-b87f-0959cae97566", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--813e4c09-51df-4168-a309-374e6c9dbf10", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-34713", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34713", "source_name": "cve", "external_id": "CVE-2022-34713"}]}, {"type": "relationship", "id": "relationship--dcfd9a50-e66a-40ea-9d62-f6a071cc8da2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--813e4c09-51df-4168-a309-374e6c9dbf10", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--1488cb63-84e7-4578-a519-b48ed71716b6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--813e4c09-51df-4168-a309-374e6c9dbf10", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--122d551b-d892-4175-aa58-30a29693b8b0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--813e4c09-51df-4168-a309-374e6c9dbf10", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d48abb16-a872-4a7d-883e-d9de1c83e1b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-30190", "description": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30190", "source_name": "cve", "external_id": "CVE-2022-30190"}]}, {"type": "relationship", "id": "relationship--d3fab765-f3fd-482d-a961-f2dd4e44616c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d48abb16-a872-4a7d-883e-d9de1c83e1b4", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--d427d994-52e7-47d6-846c-4b5dcbfda5a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d48abb16-a872-4a7d-883e-d9de1c83e1b4", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--e4e229dd-5f04-4ee7-b3e7-95a798b078dd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-28810", "description": "Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28810", "source_name": "cve", "external_id": "CVE-2022-28810"}]}, {"type": "relationship", "id": "relationship--952b98a7-23cd-4727-8385-234c19ae19b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e4e229dd-5f04-4ee7-b3e7-95a798b078dd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--aa2b33c9-1ab7-41e2-80cb-275081069da9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26501", "description": "Veeam Backup & Replication Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26501", "source_name": "cve", "external_id": "CVE-2022-26501"}]}, {"type": "relationship", "id": "relationship--24487640-a538-4491-bdb9-b8fd9f43e771", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--aa2b33c9-1ab7-41e2-80cb-275081069da9", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f5041444-66d5-47d3-bbfb-d5fb6e77f783", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--aa2b33c9-1ab7-41e2-80cb-275081069da9", "target_ref": "attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0"}, {"type": "relationship", "id": "relationship--a6a22352-2802-4a04-95ae-97156da43a72", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--aa2b33c9-1ab7-41e2-80cb-275081069da9", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--76697afc-7df3-48da-b8a6-b11cc07fe63b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--aa2b33c9-1ab7-41e2-80cb-275081069da9", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "vulnerability", "id": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26500", "description": "Veeam Backup & Replication Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26500", "source_name": "cve", "external_id": "CVE-2022-26500"}]}, {"type": "relationship", "id": "relationship--77489dd4-c679-4420-a19e-f9b3165ab884", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b69228ac-4a9c-4455-9540-b8111a3134e4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "target_ref": "attack-pattern--42e8de7b-37b2-4258-905a-6897815e58e0"}, {"type": "relationship", "id": "relationship--e9dfb3bb-7f60-4f35-92a5-4e316d3d4993", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--219a77c0-f858-4854-825b-26acb4203aa2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--6a9e1bb0-6303-4f2f-b5e6-ad77c5f418b8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca3c7360-3a76-4c20-9ba9-4ccd6ac55d0a", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "vulnerability", "id": "vulnerability--3434b506-e8e7-4d8b-9796-9a227a8afbbc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26258", "description": "D-Link DIR-820L Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26258", "source_name": "cve", "external_id": "CVE-2022-26258"}]}, {"type": "relationship", "id": "relationship--cc59c41c-ca21-4f76-b4d5-f8e0db1a604f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3434b506-e8e7-4d8b-9796-9a227a8afbbc", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--3f079a57-d955-4473-9674-045bd72d1c98", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3434b506-e8e7-4d8b-9796-9a227a8afbbc", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--659e826a-87a7-4083-97f5-9746331501c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3434b506-e8e7-4d8b-9796-9a227a8afbbc", "target_ref": "attack-pattern--38eb0c22-6caf-46ce-8869-5964bd735858"}, {"type": "vulnerability", "id": "vulnerability--db798e57-061f-46c3-ba1a-67a8639d0132", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26134", "description": "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26134", "source_name": "cve", "external_id": "CVE-2022-26134"}]}, {"type": "relationship", "id": "relationship--d562fda9-b39d-4807-bc62-55a105061178", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--db798e57-061f-46c3-ba1a-67a8639d0132", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--f9d9eee6-749c-40c7-8627-0275da8382db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22965", "description": "Spring Framework JDK 9+ Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965", "source_name": "cve", "external_id": "CVE-2022-22965"}]}, {"type": "relationship", "id": "relationship--8722304c-fb06-4036-907f-de30cca31d53", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f9d9eee6-749c-40c7-8627-0275da8382db", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--efa53e93-ab05-44cc-87eb-507b471c3377", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f9d9eee6-749c-40c7-8627-0275da8382db", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--99d64fbe-4443-4b25-9e2e-1cba9a11c5fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22963", "description": "VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22963", "source_name": "cve", "external_id": "CVE-2022-22963"}]}, {"type": "relationship", "id": "relationship--0effb234-8a3d-47df-a1dc-fe9e76049afe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--99d64fbe-4443-4b25-9e2e-1cba9a11c5fd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--180e9572-c272-475e-ba57-46ffce63a1a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--99d64fbe-4443-4b25-9e2e-1cba9a11c5fd", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--bcb2d6a7-21fa-4f9b-91f2-65d582f6ac70", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--99d64fbe-4443-4b25-9e2e-1cba9a11c5fd", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--e8698845-ed28-47a8-90d0-2ea4343d5f0d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-21971", "description": "Microsoft Windows Runtime Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21971", "source_name": "cve", "external_id": "CVE-2022-21971"}]}, {"type": "relationship", "id": "relationship--1a1c588a-f62f-4b35-9203-783b851e2f91", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e8698845-ed28-47a8-90d0-2ea4343d5f0d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b3472309-7b65-4fef-a284-fa8b83f5b0c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e8698845-ed28-47a8-90d0-2ea4343d5f0d", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-45382", "description": "D-Link Multiple Routers Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45382", "source_name": "cve", "external_id": "CVE-2021-45382"}]}, {"type": "relationship", "id": "relationship--dd078c53-e41d-4241-b21d-e9a9214e3cb5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--355be19c-ffc9-46d5-8d50-d6a036c675b6"}, {"type": "relationship", "id": "relationship--ccd7785a-d844-4e64-8388-65517454dab3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--70013079-628e-466a-8938-28472fee5097", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7fdb6ebe-9d95-4b62-bc57-7d72c86cb476", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--38eb0c22-6caf-46ce-8869-5964bd735858"}, {"type": "relationship", "id": "relationship--5496b4b3-b6e5-4915-a6a0-3dfd666a68d7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "relationship", "id": "relationship--86979372-e77f-46d1-8263-f2a9541d1587", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9988ed1c-45cf-4fc8-8d08-4bcb7e37429e", "target_ref": "attack-pattern--799ace7f-e227-4411-baa0-8868704f2a69"}, {"type": "vulnerability", "id": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-44228", "description": "Apache Log4j2 Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228", "source_name": "cve", "external_id": "CVE-2021-44228"}]}, {"type": "relationship", "id": "relationship--9215efce-cf63-4488-bd44-975c92d694c1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--45b54a10-9c06-4395-a47c-1a8658d370bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--8305891a-d451-45e7-9819-2f12de170551", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--13b70fb7-6b98-49c8-8d35-455bee473779", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--662c52ca-2cf9-4975-9981-21a12b0bd6bb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--821cdcbc-0787-48da-86bb-03a380510e14", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-44077", "description": "Zoho ManageEngine ServiceDesk Plus Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44077", "source_name": "cve", "external_id": "CVE-2021-44077"}]}, {"type": "relationship", "id": "relationship--685ccae1-0c2a-47cd-a831-a873eb9b2ed4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--171f10f4-2532-4720-86ba-66715afdb88d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7ba9b53e-7ef4-4f5d-98b1-088ad1f1266d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--1149bac2-7f20-4633-b27f-271044a38536", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--00f90846-cbd1-4fc5-9233-df5c2bf2a662"}, {"type": "relationship", "id": "relationship--5463bae3-379b-4286-a8fc-c63987cb67db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--18767c27-7582-456a-9668-a43fa359dc39", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--01a5a209-b94c-450b-b7f9-946497d91055"}, {"type": "relationship", "id": "relationship--4be46f01-2ac1-42e2-89e3-3ccda732f15a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--683d370d-2b19-4802-a9f2-67d23c2e97db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--7929de96-3c44-4c1a-9409-63a5c3fb05b5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--457c7820-d331-465a-915e-42f85500ccc4"}, {"type": "relationship", "id": "relationship--7bfebf29-cf3f-470b-ab9c-9d377042baf7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--98a7c4b5-58e0-454f-ba32-b6e099efefd1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--3ccef7ae-cb5e-48f6-8302-897105fbf55c"}, {"type": "relationship", "id": "relationship--005e83b5-2515-460e-aef4-05ed20c1b9e3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--cfeb07d4-0ba2-4027-a54a-29a0287bfc34", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2762d565-0e17-426e-9e5d-78a5373fa3b6", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--63495fa1-e84d-4d64-925e-d8eee4846f59", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-42321", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42321", "source_name": "cve", "external_id": "CVE-2021-42321"}]}, {"type": "relationship", "id": "relationship--1802c31d-8c4b-415b-b12b-7d79b7c993f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--63495fa1-e84d-4d64-925e-d8eee4846f59", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--ef454cd2-0db2-436e-b363-cba88c35c004", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--63495fa1-e84d-4d64-925e-d8eee4846f59", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "vulnerability", "id": "vulnerability--5fd25993-995a-4dea-9ac3-3b64d075ae44", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-39144", "description": "XStream Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39144", "source_name": "cve", "external_id": "CVE-2021-39144"}]}, {"type": "relationship", "id": "relationship--46ffc127-f380-42ba-abce-b860002a4659", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5fd25993-995a-4dea-9ac3-3b64d075ae44", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--edc5bc12-0f90-474e-abbb-3a1ba77f7277", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5fd25993-995a-4dea-9ac3-3b64d075ae44", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--7ecf6ebe-a815-4306-85b8-5862ac605986", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-35464", "description": "ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35464", "source_name": "cve", "external_id": "CVE-2021-35464"}]}, {"type": "relationship", "id": "relationship--f515199b-a047-4a70-a18f-28a18001d395", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7ecf6ebe-a815-4306-85b8-5862ac605986", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4423069e-0367-4936-829c-304e83a5e693", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7ecf6ebe-a815-4306-85b8-5862ac605986", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-35394", "description": "Realtek Jungle SDK Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35394", "source_name": "cve", "external_id": "CVE-2021-35394"}]}, {"type": "relationship", "id": "relationship--db254138-f7af-451c-bb3a-bf71fd4d33c9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0ca3eb03-17dd-4221-87a7-85dc3bc11568", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--687d7b1d-6ace-440b-b7b4-2943d52f79b1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--40e9e4ca-21f2-4ee6-978f-33f3c8f3022e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "relationship", "id": "relationship--57b86a4b-04cd-4805-8fbe-7dd732070b9c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--f1951e8a-500e-4a26-8803-76d95c4554b4"}, {"type": "relationship", "id": "relationship--fe81ae5a-2489-4bfa-a746-7b3c6de64e30", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--5bf91fa7-fb42-4965-a8f2-666615c73ccd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4d212443-2fd2-4a8f-b781-36e8d515cffa", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-34473", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34473", "source_name": "cve", "external_id": "CVE-2021-34473"}]}, {"type": "relationship", "id": "relationship--19f2a941-85ad-44e6-abc9-cc5980f6aa1c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "target_ref": "attack-pattern--005a06c6-14bf-4118-afa0-ebcd8aebb0c9"}, {"type": "relationship", "id": "relationship--66e1a72f-7185-452e-8dcf-c0524bd36d65", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--00e24ecd-bb8d-4de7-9560-69dd3622e5fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--2c3ec15b-64d7-402a-ad78-1838078aaada", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "target_ref": "attack-pattern--fb8d023d-45be-47e9-bc51-f56bcae6435b"}, {"type": "relationship", "id": "relationship--90f7ac4f-0293-4eb7-9fcc-b81c6fce2d52", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca25d5e5-2dbd-44cc-ae6f-17b35c3254eb", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "vulnerability", "id": "vulnerability--617a7c88-147a-4199-98e1-2217eb927936", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-31166", "description": "Microsoft HTTP Protocol Stack Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31166", "source_name": "cve", "external_id": "CVE-2021-31166"}]}, {"type": "relationship", "id": "relationship--baf6d4d6-c1ff-4cf3-8a44-9153765b0fa1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--617a7c88-147a-4199-98e1-2217eb927936", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b85bd021-faad-4eb9-8b72-7b521b29a0a4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--617a7c88-147a-4199-98e1-2217eb927936", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a0cf2e7d-afe2-4f6b-a281-fa155dedd059", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27065", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27065", "source_name": "cve", "external_id": "CVE-2021-27065"}]}, {"type": "relationship", "id": "relationship--b38ea8a2-e55c-495b-a840-f42675e1ae69", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a0cf2e7d-afe2-4f6b-a281-fa155dedd059", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--2c59edbf-5322-430d-ad69-98d0663970a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a0cf2e7d-afe2-4f6b-a281-fa155dedd059", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--b7e9492a-13e9-4e4c-bed9-a873d1f0119b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-27059", "description": "Microsoft Office Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27059", "source_name": "cve", "external_id": "CVE-2021-27059"}]}, {"type": "relationship", "id": "relationship--494c0bed-b4d6-4397-9fed-25699613d407", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b7e9492a-13e9-4e4c-bed9-a873d1f0119b", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--ebdba484-ba8a-4cf1-9ce2-1cac72305ff1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-26858", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26858", "source_name": "cve", "external_id": "CVE-2021-26858"}]}, {"type": "relationship", "id": "relationship--b443369b-0e2c-4fcd-b16e-369ca7940d93", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ebdba484-ba8a-4cf1-9ce2-1cac72305ff1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--e7e10824-6716-41ec-9b3b-bdda756071dd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ebdba484-ba8a-4cf1-9ce2-1cac72305ff1", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--811a818f-bda6-4383-990b-e6774cfcdf61", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-26857", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26857", "source_name": "cve", "external_id": "CVE-2021-26857"}]}, {"type": "relationship", "id": "relationship--faac296e-f88f-427a-8f76-f18aacb88d39", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--811a818f-bda6-4383-990b-e6774cfcdf61", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--c6eb1bc3-4fc8-4fd4-9770-2fdd0cfc7d56", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--811a818f-bda6-4383-990b-e6774cfcdf61", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--1a61e652-1081-4dea-8936-413f317d50b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-26855", "description": "Microsoft Exchange Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26855", "source_name": "cve", "external_id": "CVE-2021-26855"}]}, {"type": "relationship", "id": "relationship--3f546eaa-e10f-42cd-9a23-95aa25a31c9e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1a61e652-1081-4dea-8936-413f317d50b4", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--0899e238-b268-4cc2-89bb-8ce3a3422952", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1a61e652-1081-4dea-8936-413f317d50b4", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--e50c7924-44e2-40af-b390-12df162729fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1a61e652-1081-4dea-8936-413f317d50b4", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "relationship", "id": "relationship--6cf8ee31-b006-4cbd-99e6-34cc9e233027", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1a61e652-1081-4dea-8936-413f317d50b4", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22986", "description": "F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22986", "source_name": "cve", "external_id": "CVE-2021-22986"}]}, {"type": "relationship", "id": "relationship--b65a2608-dea2-4a4b-b064-a88f4d48da7c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f2387c6f-7f70-446f-8193-de8af5b39ab1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--2d9f7583-717a-46a7-9487-c92da3134ff0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--dfad5061-fc82-4d4b-88f0-0a0b54177bb3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "relationship", "id": "relationship--22b50052-9157-4d3b-9cf7-b21074c27ce5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e64a672a-a7f3-4f00-ad28-412ce24dda94", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22205", "description": "GitLab Community and Enterprise Editions Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22205", "source_name": "cve", "external_id": "CVE-2021-22205"}]}, {"type": "relationship", "id": "relationship--11f7507b-1ede-4dfb-971a-e4e48c163ea3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--254d13e8-9455-4fd6-b715-6f1167fb63fa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--f4a76a0c-e0fb-461c-a164-c98451696468", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0da7b0c0-e095-4921-8414-19f0501ec511", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--e0a76a00-b54f-44ef-b345-1ed4d9e27f06", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b9cfb7d1-04be-4bc2-a8b9-cf05d44097af", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "vulnerability", "id": "vulnerability--e266b909-ea1b-4d87-b1ac-e392ba526154", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22204", "description": "ExifTool Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22204", "source_name": "cve", "external_id": "CVE-2021-22204"}]}, {"type": "relationship", "id": "relationship--c7d835ee-17ff-48f9-beef-22088cd2ecbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e266b909-ea1b-4d87-b1ac-e392ba526154", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8e0c66a5-1485-4725-bc60-e3f07b704188", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e266b909-ea1b-4d87-b1ac-e392ba526154", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d2a82b18-bfde-464c-a947-fab63ae22307", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-21972", "description": "VMware vCenter Server Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21972", "source_name": "cve", "external_id": "CVE-2021-21972"}]}, {"type": "relationship", "id": "relationship--e75f2027-ac90-4ab5-96f3-a8e569a2e600", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d2a82b18-bfde-464c-a947-fab63ae22307", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--731ec04e-b932-4a7e-a329-82e9c0bbb101", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d2a82b18-bfde-464c-a947-fab63ae22307", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-5902", "description": "F5 BIG-IP Traffic Management User Interface (TMUI) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5902", "source_name": "cve", "external_id": "CVE-2020-5902"}]}, {"type": "relationship", "id": "relationship--10589648-b36f-4678-b8ce-a43529460743", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--10190d30-2645-477e-8347-6fa29b5fb5fc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--47d7e815-ac0c-4431-b0c9-8a763558cc22", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--196e95a5-5ddc-4e64-8871-537d4b5417df", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--ac08589e-ee59-4935-8667-d845e38fe579"}, {"type": "relationship", "id": "relationship--27bc79d2-23c7-4ec3-b587-5793844a5d78", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--8228577b-d9b5-4130-8a23-e0deb2807c8d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--5dc7807c-be30-492d-8e07-09b362a13a6f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "relationship", "id": "relationship--8437feb8-9dd9-4c2b-9b25-707d55a6109e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a7e58614-e190-4a41-a723-828c820d4416", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--bc9ddb7f-feac-4382-9713-cb5b94692dc4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-17530", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-17530", "source_name": "cve", "external_id": "CVE-2020-17530"}]}, {"type": "relationship", "id": "relationship--66681c8d-492c-42be-9716-de100ca3a00a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bc9ddb7f-feac-4382-9713-cb5b94692dc4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--2d95eabd-6036-4af0-945b-90d23eed394a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bc9ddb7f-feac-4382-9713-cb5b94692dc4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--5e0eb074-499a-4785-b777-f87c75509829", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-15505", "description": "Ivanti MobileIron Multiple Products Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15505", "source_name": "cve", "external_id": "CVE-2020-15505"}]}, {"type": "relationship", "id": "relationship--06a95050-af91-42ab-9e84-2f9f2a91a7be", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5e0eb074-499a-4785-b777-f87c75509829", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--39946c77-064c-4860-9916-91d05b5d2e27", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5e0eb074-499a-4785-b777-f87c75509829", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--6ea3834c-c38f-4ad9-b55b-8486a8a70bdd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-0688", "description": "Microsoft Exchange Server Validation Key Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0688", "source_name": "cve", "external_id": "CVE-2020-0688"}]}, {"type": "relationship", "id": "relationship--030178d4-61c9-4a0c-a460-3ea766eec254", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6ea3834c-c38f-4ad9-b55b-8486a8a70bdd", "target_ref": "attack-pattern--1608f3e1-598a-42f4-a01a-2e252e81728f"}, {"type": "relationship", "id": "relationship--61c76aa5-b6c8-4ed2-8942-65b5ca29faf8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6ea3834c-c38f-4ad9-b55b-8486a8a70bdd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8d1319fc-47f3-4ead-93ea-37fbddaad543", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6ea3834c-c38f-4ad9-b55b-8486a8a70bdd", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--020269f8-b475-42d5-97fe-2288ce26d1ac", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6ea3834c-c38f-4ad9-b55b-8486a8a70bdd", "target_ref": "attack-pattern--a93494bb-4b80-4ea1-8695-3236a49916fd"}, {"type": "vulnerability", "id": "vulnerability--d6d67838-9729-454d-a000-31e3c565b016", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-19781", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781", "source_name": "cve", "external_id": "CVE-2019-19781"}]}, {"type": "relationship", "id": "relationship--8c670944-e55f-4594-979d-fe976b2c5b34", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d6d67838-9729-454d-a000-31e3c565b016", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6dc1f702-f9f2-4edf-b255-b0083c15a45e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d6d67838-9729-454d-a000-31e3c565b016", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--1a794f87-ad74-4c60-9c75-1f1d1b2652ed", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d6d67838-9729-454d-a000-31e3c565b016", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--02b4340b-aec4-4021-b071-4673875c8612", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-17558", "description": "Apache Solr VelocityResponseWriter Plug-In Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17558", "source_name": "cve", "external_id": "CVE-2019-17558"}]}, {"type": "relationship", "id": "relationship--8010b8fc-8772-49b8-8423-46419e45d032", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--02b4340b-aec4-4021-b071-4673875c8612", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--5d01ce70-6cb9-4393-a0a0-6d6d9a191404", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--02b4340b-aec4-4021-b071-4673875c8612", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-11634", "description": "Citrix Workspace Application and Receiver for Windows Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11634", "source_name": "cve", "external_id": "CVE-2019-11634"}]}, {"type": "relationship", "id": "relationship--c4fc5347-b5f9-4e1e-afe6-a86f9691ec47", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c094e45e-c9ec-438e-a53d-734f2860ca5b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--7746455d-edcf-4104-a8e3-52d8af3cf557", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--170b2f3f-3572-46ed-8a4b-15f06b851236", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--1b4b6fa9-33f6-4a9b-86c4-1b15a2f8d290", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--f8f336b4-fd19-4c01-9a4d-58d9d016de99", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--e31958f4-fe32-4ece-9afc-02c6b91e770d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--164b0e1b-c7b5-4543-b197-e3259af0644d", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "vulnerability", "id": "vulnerability--ee29257e-ce95-4a43-809d-14b425f90df0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-11580", "description": "Atlassian Crowd and Crowd Data Center Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11580", "source_name": "cve", "external_id": "CVE-2019-11580"}]}, {"type": "relationship", "id": "relationship--006cead9-decc-4041-a555-632ab7632b6a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ee29257e-ce95-4a43-809d-14b425f90df0", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--86422e09-2ec9-4a14-94db-66666f6fc64f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-0708", "description": "Microsoft Remote Desktop Services Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708", "source_name": "cve", "external_id": "CVE-2019-0708"}]}, {"type": "relationship", "id": "relationship--f7c14505-554b-44db-8e9f-68be93bcfa79", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--86422e09-2ec9-4a14-94db-66666f6fc64f", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "relationship", "id": "relationship--6e5b9bf5-6bad-4401-ba3c-c3a03b00a677", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--86422e09-2ec9-4a14-94db-66666f6fc64f", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--78a5dafb-b2cd-4327-afd9-0366c2caf0f6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--86422e09-2ec9-4a14-94db-66666f6fc64f", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-0604", "description": "Microsoft SharePoint Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0604", "source_name": "cve", "external_id": "CVE-2019-0604"}]}, {"type": "relationship", "id": "relationship--e43503a8-14dd-478b-98b9-0a6a12750abd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4063eed2-f172-4578-96ac-8e83184f80e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--74c189c5-f7fb-40b0-baca-91b116808882", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--d83a9c44-c13d-4ecf-9459-ebab6da45153", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--ada499fc-e42d-4984-a2fd-1b6c902fd0c2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9373a01d-6f69-4672-8507-a80d81177b2e", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--f164b7ed-e5a5-4fe1-8afc-b35b13791dcd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-7600", "description": "Drupal Core Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-7600", "source_name": "cve", "external_id": "CVE-2018-7600"}]}, {"type": "relationship", "id": "relationship--f4fa0904-caf8-4f38-8d4f-55b550a91c2a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f164b7ed-e5a5-4fe1-8afc-b35b13791dcd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d3092452-6c3e-4501-8c95-bb9424e1af69", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f164b7ed-e5a5-4fe1-8afc-b35b13791dcd", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "relationship", "id": "relationship--c0665bef-d712-41fa-a8a4-2198dd40e8a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f164b7ed-e5a5-4fe1-8afc-b35b13791dcd", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--38a05cfe-9b02-4de9-b239-0680481800e9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f164b7ed-e5a5-4fe1-8afc-b35b13791dcd", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--3b68e45b-2637-411d-a9f7-175871b2a770", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-11776", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11776", "source_name": "cve", "external_id": "CVE-2018-11776"}]}, {"type": "relationship", "id": "relationship--826e5574-c4f3-4698-8f70-e35ee93bab1d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3b68e45b-2637-411d-a9f7-175871b2a770", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b7846e9f-856e-4e09-ae8f-3c27f3b9ce3e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3b68e45b-2637-411d-a9f7-175871b2a770", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--6f3f04e8-8ff0-45e0-8f54-a0f933f407da", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3b68e45b-2637-411d-a9f7-175871b2a770", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--3ce876f3-867d-4b7b-8f58-2d4102655929", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-9822", "description": "DotNetNuke (DNN) Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9822", "source_name": "cve", "external_id": "CVE-2017-9822"}]}, {"type": "relationship", "id": "relationship--595c4291-847c-4cd8-b55c-7a0aaccecb45", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3ce876f3-867d-4b7b-8f58-2d4102655929", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ec3b1ef9-2d2d-46bd-bb3f-9e30016d1343", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3ce876f3-867d-4b7b-8f58-2d4102655929", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--274498b0-40f9-44c9-8caa-e2b64fe6f6d7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3ce876f3-867d-4b7b-8f58-2d4102655929", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a5a1d5d9-7a15-4cab-b246-0406af46aa2f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-6742", "description": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6742", "source_name": "cve", "external_id": "CVE-2017-6742"}]}, {"type": "relationship", "id": "relationship--db7a89a5-a67a-4a77-af32-89c22c7f88d0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a5a1d5d9-7a15-4cab-b246-0406af46aa2f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--7d6eec75-827c-475a-a5fc-d1174ba7494b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a5a1d5d9-7a15-4cab-b246-0406af46aa2f", "target_ref": "attack-pattern--28abec6c-4443-4b03-8206-07f2e264a6b4"}, {"type": "relationship", "id": "relationship--dcc00a6a-d155-44b1-bcb3-26395250f803", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a5a1d5d9-7a15-4cab-b246-0406af46aa2f", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--98bdc033-08a5-47d5-a13a-91880a375957", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a5a1d5d9-7a15-4cab-b246-0406af46aa2f", "target_ref": "attack-pattern--a19e86f8-1c0a-4fea-8407-23b73d615776"}, {"type": "vulnerability", "id": "vulnerability--9c0bd5ad-ee3f-4356-9d3c-0208c7e6e08a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-5638", "description": "Apache Struts Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5638", "source_name": "cve", "external_id": "CVE-2017-5638"}]}, {"type": "relationship", "id": "relationship--5ba57d9d-af63-4285-a3d1-4c601f257267", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9c0bd5ad-ee3f-4356-9d3c-0208c7e6e08a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--1e0025cc-3cf2-4350-b0ce-28907e8a57b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9c0bd5ad-ee3f-4356-9d3c-0208c7e6e08a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cb43498a-c8e2-45d0-a950-8cd464ac9701", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9c0bd5ad-ee3f-4356-9d3c-0208c7e6e08a", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--e4f88690-cea0-4fc6-ac53-a977a924eb45", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-4437", "description": "Apache Shiro Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4437", "source_name": "cve", "external_id": "CVE-2016-4437"}]}, {"type": "relationship", "id": "relationship--70f0a7d8-4e07-459e-9d79-19d0194333f0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e4f88690-cea0-4fc6-ac53-a977a924eb45", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c898dbcc-a873-42b2-a8ca-699aa48f4030", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e4f88690-cea0-4fc6-ac53-a977a924eb45", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a170381c-d785-4c76-934a-a8e325aca52a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-4117", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4117", "source_name": "cve", "external_id": "CVE-2016-4117"}]}, {"type": "relationship", "id": "relationship--d4efce55-ce69-46ee-bef5-c506a29aadf1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a170381c-d785-4c76-934a-a8e325aca52a", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--37295c65-ad6b-4302-acef-c4a6c11ee860", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a170381c-d785-4c76-934a-a8e325aca52a", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--01843672-1205-48ea-b028-c0e37005d64a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-1019", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1019", "source_name": "cve", "external_id": "CVE-2016-1019"}]}, {"type": "relationship", "id": "relationship--661fe2ce-9fd1-4345-a777-b1d8661e7904", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--01843672-1205-48ea-b028-c0e37005d64a", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--ff976e57-e046-4f0b-aceb-7969bfd467ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--01843672-1205-48ea-b028-c0e37005d64a", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--c489648b-921a-4dec-9c74-e1db238cca93", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--01843672-1205-48ea-b028-c0e37005d64a", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--14f90291-57d1-4953-be62-1e387d2f4397", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2015-7645", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7645", "source_name": "cve", "external_id": "CVE-2015-7645"}]}, {"type": "relationship", "id": "relationship--1b2c075f-0c87-4307-88f4-67208738ce71", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--14f90291-57d1-4953-be62-1e387d2f4397", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--c9601d53-6de4-460a-a8bd-50e1ace7d45d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2014-7169", "description": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", "source_name": "cve", "external_id": "CVE-2014-7169"}]}, {"type": "relationship", "id": "relationship--37c578e3-1817-4032-be52-0632ef7ad73e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c9601d53-6de4-460a-a8bd-50e1ace7d45d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--659f2849-2e74-40c1-ab41-6b0a3e24d17d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c9601d53-6de4-460a-a8bd-50e1ace7d45d", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--5bd1f805-e427-4639-bfb0-492cbdc01bfa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c9601d53-6de4-460a-a8bd-50e1ace7d45d", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--f871a178-925d-4ec9-a194-b27c8badf524", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2014-6271", "description": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", "source_name": "cve", "external_id": "CVE-2014-6271"}]}, {"type": "relationship", "id": "relationship--9415d3ef-a9de-4f05-8cd8-fdc94881a939", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f871a178-925d-4ec9-a194-b27c8badf524", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--687ede28-1396-44e6-9ca0-8e4cac409cb7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f871a178-925d-4ec9-a194-b27c8badf524", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "relationship", "id": "relationship--bebf1eb7-1002-49d5-816e-97d33797661c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f871a178-925d-4ec9-a194-b27c8badf524", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--e9dbbdd2-09cd-488d-b04a-51630014d09e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2012-1535", "description": "Adobe Flash Player Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1535", "source_name": "cve", "external_id": "CVE-2012-1535"}]}, {"type": "relationship", "id": "relationship--65abe88e-0169-4850-a919-09c1367af58e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e9dbbdd2-09cd-488d-b04a-51630014d09e", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--ceb2e9cc-9102-41d7-ad1c-08d5774ff3ba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e9dbbdd2-09cd-488d-b04a-51630014d09e", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--72cf1fa0-b6d3-4ccc-9cd1-b14e3273f8e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2011-0611", "description": "Adobe Flash Player Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0611", "source_name": "cve", "external_id": "CVE-2011-0611"}]}, {"type": "relationship", "id": "relationship--3ac28b84-b537-4e12-adec-cf9ce938c376", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--72cf1fa0-b6d3-4ccc-9cd1-b14e3273f8e1", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--406a8313-3715-4dee-b8fa-d212dc12c387", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--72cf1fa0-b6d3-4ccc-9cd1-b14e3273f8e1", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--2d83bacc-8d31-4cef-bf74-65e9d7be58a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2010-0188", "description": "Adobe Reader and Acrobat Arbitrary Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0188", "source_name": "cve", "external_id": "CVE-2010-0188"}]}, {"type": "relationship", "id": "relationship--0554f56a-1609-4b09-97f3-8b8fa6af094c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2d83bacc-8d31-4cef-bf74-65e9d7be58a1", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--418f5e3f-fd64-47c4-8779-5e867aadbc46", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2d83bacc-8d31-4cef-bf74-65e9d7be58a1", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--7805fac8-f56d-4fb1-a9fe-72c13eb62da3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2009-3953", "description": "Adobe Acrobat and Reader Universal 3D Remote Code Execution Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3953", "source_name": "cve", "external_id": "CVE-2009-3953"}]}, {"type": "relationship", "id": "relationship--00c8513b-4914-4729-8f65-8690ee4dd06a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7805fac8-f56d-4fb1-a9fe-72c13eb62da3", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--7dc19d9b-fe7a-4ede-ba6f-d6c87ba8c0eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20118", "description": "Cisco Small Business RV Series Routers Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20118", "source_name": "cve", "external_id": "CVE-2023-20118"}]}, {"type": "relationship", "id": "relationship--67e558c4-9721-43a8-bd8e-15e120417297", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7dc19d9b-fe7a-4ede-ba6f-d6c87ba8c0eb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--1e38f785-e30a-4a5c-bb56-bf3a829f3016", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7dc19d9b-fe7a-4ede-ba6f-d6c87ba8c0eb", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--fda1b19e-831d-429e-a6c4-c232b7099404", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7dc19d9b-fe7a-4ede-ba6f-d6c87ba8c0eb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f74a5e62-d3cb-4f87-b882-20d1a81b666e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7dc19d9b-fe7a-4ede-ba6f-d6c87ba8c0eb", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--a5e8b780-4a38-420f-bd29-35dee334d425", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2016-10033", "description": "PHPMailer Command Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10033", "source_name": "cve", "external_id": "CVE-2016-10033"}]}, {"type": "relationship", "id": "relationship--51c402a7-2f12-4f5e-be1b-b687268c3034", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a5e8b780-4a38-420f-bd29-35dee334d425", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--639e209a-c905-4f06-8f2c-6bb00581b10b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a5e8b780-4a38-420f-bd29-35dee334d425", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--1c73856c-5ef0-45f1-a3ad-865d7fe3f87c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-5217", "description": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5217", "source_name": "cve", "external_id": "CVE-2024-5217"}]}, {"type": "relationship", "id": "relationship--ad75d899-d63e-4f6d-a626-ee983a321127", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1c73856c-5ef0-45f1-a3ad-865d7fe3f87c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6bdc74c0-6940-4e20-a30d-ab8faa7e4651", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1c73856c-5ef0-45f1-a3ad-865d7fe3f87c", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--48c4981f-b9e6-4e78-8a18-1c6dc19aef9f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4879", "description": "ServiceNow Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4879", "source_name": "cve", "external_id": "CVE-2024-4879"}]}, {"type": "relationship", "id": "relationship--0712794e-c746-4be6-9859-1358b89008e6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--48c4981f-b9e6-4e78-8a18-1c6dc19aef9f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ec6abc73-020e-4ac3-a029-d59c2e414aea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--48c4981f-b9e6-4e78-8a18-1c6dc19aef9f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d2d524d6-5437-4dc0-9a71-69753704bc9e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--48c4981f-b9e6-4e78-8a18-1c6dc19aef9f", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--1bc9569e-00c5-485a-a2ed-e7fa74b499f6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-2868", "description": "Barracuda Networks ESG Appliance Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2868", "source_name": "cve", "external_id": "CVE-2023-2868"}]}, {"type": "relationship", "id": "relationship--6f65e7ef-0009-45b1-a462-6e759a7f654c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1bc9569e-00c5-485a-a2ed-e7fa74b499f6", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6d438bb1-f1b1-4f43-b264-4900b27b6822", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1bc9569e-00c5-485a-a2ed-e7fa74b499f6", "target_ref": "attack-pattern--2e34237d-8574-43f6-aace-ae2915de8597"}, {"type": "relationship", "id": "relationship--c871467c-a59a-4161-8019-a6fab4e1c836", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1bc9569e-00c5-485a-a2ed-e7fa74b499f6", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--1e7bfff7-c151-4e16-87f9-8bef2be74c36", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1bc9569e-00c5-485a-a2ed-e7fa74b499f6", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--71dbc802-ce76-408e-8cb1-1e26f893d9db", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-3075", "description": "Google Chromium Mojo Insufficient Data Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3075", "source_name": "cve", "external_id": "CVE-2022-3075"}]}, {"type": "relationship", "id": "relationship--2f290f59-1d25-49a2-a91f-057a4b2990cc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--71dbc802-ce76-408e-8cb1-1e26f893d9db", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--752e0348-7c77-436a-ac8f-7ebc75b258bd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-24086", "description": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24086", "source_name": "cve", "external_id": "CVE-2022-24086"}]}, {"type": "relationship", "id": "relationship--6d785602-aa7a-4b4f-a8ff-c13f743ee907", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--752e0348-7c77-436a-ac8f-7ebc75b258bd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--50e0e185-c522-4e66-b290-e069869940c0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--752e0348-7c77-436a-ac8f-7ebc75b258bd", "target_ref": "attack-pattern--d28ef391-8ed4-45dc-bc4a-2f43abf54416"}, {"type": "relationship", "id": "relationship--12a7452c-3561-4ab2-854b-3ae6964a6249", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--752e0348-7c77-436a-ac8f-7ebc75b258bd", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "vulnerability", "id": "vulnerability--e67ed49f-8ef4-45a3-a04d-3cfc8c19298c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-0069", "description": "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0069", "source_name": "cve", "external_id": "CVE-2020-0069"}]}, {"type": "relationship", "id": "relationship--887cfdc3-b791-4254-8a93-ecc3b19dfb81", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e67ed49f-8ef4-45a3-a04d-3cfc8c19298c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--2b1bca8f-87cf-430e-b0c6-cb03d39f98ff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2008-2992", "description": "Adobe Reader and Acrobat Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2992", "source_name": "cve", "external_id": "CVE-2008-2992"}]}, {"type": "relationship", "id": "relationship--eba1be96-7f23-4b09-9cad-1a5971c7800e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2b1bca8f-87cf-430e-b0c6-cb03d39f98ff", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--879ec0d4-6ae0-4205-b07b-58f9b563c25d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-6558", "description": "Google Chromium ANGLE and GPU Improper Input Validation Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6558", "source_name": "cve", "external_id": "CVE-2025-6558"}]}, {"type": "relationship", "id": "relationship--480f0cc9-32d1-484d-9b55-8ca559ca2812", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--879ec0d4-6ae0-4205-b07b-58f9b563c25d", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--68bcdc3c-b98b-4052-9352-feccb127dfbd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--879ec0d4-6ae0-4205-b07b-58f9b563c25d", "target_ref": "attack-pattern--82caa33e-d11a-433a-94ea-9b5a5fbef81d"}, {"type": "relationship", "id": "relationship--10c184ae-0d3f-4c99-af1b-7dfd56d94867", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--879ec0d4-6ae0-4205-b07b-58f9b563c25d", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--8350f629-8b56-42fe-940a-d5e7dcfda34d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-47812", "description": "Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47812", "source_name": "cve", "external_id": "CVE-2025-47812"}]}, {"type": "relationship", "id": "relationship--97fb203e-6d60-40d8-9ae7-d14d31cd0c17", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8350f629-8b56-42fe-940a-d5e7dcfda34d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--ab6eea24-ae88-478d-8d9e-9e823055f2c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8350f629-8b56-42fe-940a-d5e7dcfda34d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--c0387163-5f65-4e28-820b-d95a3beaf71f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4761", "description": "Google Chromium V8 Out-of-Bounds Memory Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4761", "source_name": "cve", "external_id": "CVE-2024-4761"}]}, {"type": "relationship", "id": "relationship--3f51da66-7cfd-4f2d-9bf9-2f9bb86b7892", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c0387163-5f65-4e28-820b-d95a3beaf71f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9a8c0af3-ecd5-40a0-9101-9a055ec3f38a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-21762", "description": "Fortinet FortiOS Out-of-Bound Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21762", "source_name": "cve", "external_id": "CVE-2024-21762"}]}, {"type": "relationship", "id": "relationship--4b1c5c14-ab0d-4732-95af-e24dfe77bcea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9a8c0af3-ecd5-40a0-9101-9a055ec3f38a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--e7664583-df1f-40bc-a43f-1ce5a9761d4c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9a8c0af3-ecd5-40a0-9101-9a055ec3f38a", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--22380869-782a-46ab-bc1a-1a41f36a50e7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9a8c0af3-ecd5-40a0-9101-9a055ec3f38a", "target_ref": "attack-pattern--4ab929c6-ee2d-4fb5-aab4-b14be2ed7179"}, {"type": "vulnerability", "id": "vulnerability--660fe8e2-9e8d-4ede-b7e6-64eef8942e1a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-34048", "description": "VMware vCenter Server Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34048", "source_name": "cve", "external_id": "CVE-2023-34048"}]}, {"type": "relationship", "id": "relationship--a1c7331f-24d7-4fe1-b3e2-36febd7edc0e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--660fe8e2-9e8d-4ede-b7e6-64eef8942e1a", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--768a92a7-3e7a-4e5b-aee4-efd45262f468", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--660fe8e2-9e8d-4ede-b7e6-64eef8942e1a", "target_ref": "attack-pattern--7807d3a4-a885-4639-a786-c1ed41484970"}, {"type": "vulnerability", "id": "vulnerability--f980610a-23c8-4b3f-bc9a-e0346d55a0e8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-26369", "description": "Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26369", "source_name": "cve", "external_id": "CVE-2023-26369"}]}, {"type": "relationship", "id": "relationship--0f7805be-e004-46c0-8668-abd691c9b287", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f980610a-23c8-4b3f-bc9a-e0346d55a0e8", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "relationship", "id": "relationship--fe6afcfd-8e5f-4f53-925f-5fb85be3d584", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f980610a-23c8-4b3f-bc9a-e0346d55a0e8", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "vulnerability", "id": "vulnerability--b47736d8-b95b-4b6b-a0c8-11a4d32855ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20109", "description": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20109", "source_name": "cve", "external_id": "CVE-2023-20109"}]}, {"type": "relationship", "id": "relationship--8afab3e7-d56f-4615-9300-388a143cd89f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b47736d8-b95b-4b6b-a0c8-11a4d32855ec", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--6727b098-41af-4fa5-9d51-106a766297dc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b47736d8-b95b-4b6b-a0c8-11a4d32855ec", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--931a62d0-4533-4c2f-a7d2-d57f1db54747", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b47736d8-b95b-4b6b-a0c8-11a4d32855ec", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "vulnerability", "id": "vulnerability--311f96a2-b59b-4056-aa40-3566b293147a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-4034", "description": "Red Hat Polkit Out-of-Bounds Read and Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4034", "source_name": "cve", "external_id": "CVE-2021-4034"}]}, {"type": "relationship", "id": "relationship--d800521d-8903-4139-b015-bf5b857b51da", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--311f96a2-b59b-4056-aa40-3566b293147a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--f1e74936-84be-4724-9c0c-03b41f1c2865", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-43200", "description": "Apple Multiple Products Unspecified Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43200", "source_name": "cve", "external_id": "CVE-2025-43200"}]}, {"type": "relationship", "id": "relationship--8d6e758e-4cbd-4a23-b4cd-264865497e79", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f1e74936-84be-4724-9c0c-03b41f1c2865", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--d1d3f1c5-47ff-4275-8505-26898df8c9f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--f1e74936-84be-4724-9c0c-03b41f1c2865", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--fa685091-6ed6-4dc3-9d20-e36fd8d0950e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f1e74936-84be-4724-9c0c-03b41f1c2865", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--3ffc95fb-bbe1-485f-a39c-409ab3647b44", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-5419", "description": "Google Chromium V8 Out-of-Bounds Read and Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5419", "source_name": "cve", "external_id": "CVE-2025-5419"}]}, {"type": "relationship", "id": "relationship--55020781-c84d-432a-8a98-aae67bcd3af5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3ffc95fb-bbe1-485f-a39c-409ab3647b44", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--135c92d4-490f-4b4e-b2c3-948897e0e833", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3ffc95fb-bbe1-485f-a39c-409ab3647b44", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--036832e4-5c61-45ef-801b-20dded9c24c0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-22226", "description": "VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22226", "source_name": "cve", "external_id": "CVE-2025-22226"}]}, {"type": "relationship", "id": "relationship--5c2be54c-c04e-47ac-a42b-229a8b297137", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--036832e4-5c61-45ef-801b-20dded9c24c0", "target_ref": "attack-pattern--4a5b7ade-8bb5-4853-84ed-23f262002665"}, {"type": "vulnerability", "id": "vulnerability--1584ba17-c026-4cf9-a639-c6bb8efbb4ff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-27363", "description": "FreeType Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27363", "source_name": "cve", "external_id": "CVE-2025-27363"}]}, {"type": "relationship", "id": "relationship--ab1ad6c1-6d1c-4556-aff2-b1162e25fd27", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1584ba17-c026-4cf9-a639-c6bb8efbb4ff", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--9346701d-b252-43e8-8246-3f7b17c882f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1584ba17-c026-4cf9-a639-c6bb8efbb4ff", "target_ref": "attack-pattern--2bee5ffb-7a7a-4119-b1f2-158151b19ac0"}, {"type": "relationship", "id": "relationship--a098722f-7c7a-40ca-ad5e-b57a5e7f046c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1584ba17-c026-4cf9-a639-c6bb8efbb4ff", "target_ref": "attack-pattern--232b7f21-adf9-4b42-b936-b9d6f7df856e"}, {"type": "vulnerability", "id": "vulnerability--4f7a2eb0-01cd-4f23-8a83-2dd141fdd6d1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24201", "description": "Apple Multiple Products WebKit Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "source_name": "cve", "external_id": "CVE-2025-24201"}]}, {"type": "relationship", "id": "relationship--f1a7c069-2632-4c44-8988-5d64bcedd59c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4f7a2eb0-01cd-4f23-8a83-2dd141fdd6d1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d70c7d91-12d4-4c7d-b620-aef19d26f4a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4f7a2eb0-01cd-4f23-8a83-2dd141fdd6d1", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "relationship", "id": "relationship--a39477bb-9e2a-4573-857c-471742375cfb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--036832e4-5c61-45ef-801b-20dded9c24c0", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--bd8ac9ba-5799-476e-b2d8-7a85a3253d94", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-22225", "description": "VMware ESXi Arbitrary Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22225", "source_name": "cve", "external_id": "CVE-2025-22225"}]}, {"type": "relationship", "id": "relationship--35a32b1a-09f0-452b-b552-ede6bb262b40", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bd8ac9ba-5799-476e-b2d8-7a85a3253d94", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--9924e6af-406b-47e9-bdff-542806edce25", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bd8ac9ba-5799-476e-b2d8-7a85a3253d94", "target_ref": "attack-pattern--4a5b7ade-8bb5-4853-84ed-23f262002665"}, {"type": "vulnerability", "id": "vulnerability--bb77dee2-aff0-43d5-ba01-530c89adf942", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-22224", "description": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22224", "source_name": "cve", "external_id": "CVE-2025-22224"}]}, {"type": "relationship", "id": "relationship--1cb7ceac-ef4e-4eef-9a40-cbcfea5c859d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bb77dee2-aff0-43d5-ba01-530c89adf942", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--c01d3b5d-5900-4a2b-bc99-6ace189676e6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--bb77dee2-aff0-43d5-ba01-530c89adf942", "target_ref": "attack-pattern--4a5b7ade-8bb5-4853-84ed-23f262002665"}, {"type": "vulnerability", "id": "vulnerability--2e4a46fe-672b-439a-9693-0ff9345d0834", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24991", "description": "Microsoft Windows NTFS Out-Of-Bounds Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24991", "source_name": "cve", "external_id": "CVE-2025-24991"}]}, {"type": "relationship", "id": "relationship--9b9384a9-37fd-43d9-bbd1-cb66b4f38224", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2e4a46fe-672b-439a-9693-0ff9345d0834", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--fa95577f-193e-4c20-83f6-51642a52d3ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2e4a46fe-672b-439a-9693-0ff9345d0834", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--20be143b-15d7-422e-a0a0-405f3f07c78c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-53197", "description": "Linux Kernel Out-of-Bounds Access Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53197", "source_name": "cve", "external_id": "CVE-2024-53197"}]}, {"type": "relationship", "id": "relationship--cd02ba93-58bb-4087-9dcb-ee111ef780b3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--20be143b-15d7-422e-a0a0-405f3f07c78c", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--6796c718-97ba-4bd1-8371-1dfe4d11d9a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--20be143b-15d7-422e-a0a0-405f3f07c78c", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--df45d409-4bd2-4b40-99b3-cc820ebc3f83", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--20be143b-15d7-422e-a0a0-405f3f07c78c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--99b37e43-9079-4e80-a4cb-0ca6f527bbdd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-53150", "description": "Linux Kernel Out-of-Bounds Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53150", "source_name": "cve", "external_id": "CVE-2024-53150"}]}, {"type": "relationship", "id": "relationship--31def5a2-23fe-477b-9cc5-92b236ff0ebb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--99b37e43-9079-4e80-a4cb-0ca6f527bbdd", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--b524fadc-2bb3-4d62-90ed-319d958aa0a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--99b37e43-9079-4e80-a4cb-0ca6f527bbdd", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--d7a0c37f-a2bf-45a8-a969-a24b0109bf18", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--99b37e43-9079-4e80-a4cb-0ca6f527bbdd", "target_ref": "attack-pattern--51ea26b1-ff1e-4faa-b1a0-1114cd298c87"}, {"type": "vulnerability", "id": "vulnerability--514d2338-ada3-41e0-9ebe-ebf7d416ffbb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-53104", "description": "Linux Kernel Out-of-Bounds Write Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53104", "source_name": "cve", "external_id": "CVE-2024-53104"}]}, {"type": "relationship", "id": "relationship--e90f3edf-9f53-4db8-9c9e-5cb68f13b996", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--514d2338-ada3-41e0-9ebe-ebf7d416ffbb", "target_ref": "attack-pattern--3b744087-9945-4a6f-91e8-9dbceda417a4"}, {"type": "relationship", "id": "relationship--e8119edb-e6e8-47b9-8a1c-4c2c69df51ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--514d2338-ada3-41e0-9ebe-ebf7d416ffbb", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--5bdcc911-7bc7-48e2-a151-29666f0d2495", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--514d2338-ada3-41e0-9ebe-ebf7d416ffbb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d2c2035f-ae24-4005-b558-97c3c2416af5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-5777", "description": "Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5777", "source_name": "cve", "external_id": "CVE-2025-5777"}]}, {"type": "relationship", "id": "relationship--61129dc7-cede-4308-afe0-1c12114b179d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d2c2035f-ae24-4005-b558-97c3c2416af5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7eeea31c-8f25-486d-bc0b-65b27f454197", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d2c2035f-ae24-4005-b558-97c3c2416af5", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "vulnerability", "id": "vulnerability--4709149d-3f8e-4f80-8be9-a5ddedda89cc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4358", "description": "Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4358", "source_name": "cve", "external_id": "CVE-2024-4358"}]}, {"type": "relationship", "id": "relationship--b9f95e44-82e9-41ce-aec6-dd37307c9a75", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4709149d-3f8e-4f80-8be9-a5ddedda89cc", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--01f3b935-a6fd-43e2-bb4e-71b0349142e9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-37085", "description": "VMware ESXi Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37085", "source_name": "cve", "external_id": "CVE-2024-37085"}]}, {"type": "relationship", "id": "relationship--29d7d0e7-dcd6-4d7e-8032-7265c6181652", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--01f3b935-a6fd-43e2-bb4e-71b0349142e9", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--5b87d7d6-5bd0-49d2-94c8-4224760bcd3b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--01f3b935-a6fd-43e2-bb4e-71b0349142e9", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--a75b9cd4-9a18-4457-b07d-3a8f902d8b54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--01f3b935-a6fd-43e2-bb4e-71b0349142e9", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "vulnerability", "id": "vulnerability--f9cc56ae-7f3f-4e70-a12f-f0cc9597516e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-27198", "description": "JetBrains TeamCity Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27198", "source_name": "cve", "external_id": "CVE-2024-27198"}]}, {"type": "relationship", "id": "relationship--19f464d7-9b45-4615-a63c-09e37b7b196b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f9cc56ae-7f3f-4e70-a12f-f0cc9597516e", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--21da96ec-5f54-4ced-a1e9-8c22d5be7e3e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f9cc56ae-7f3f-4e70-a12f-f0cc9597516e", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--4c89deba-d462-4e5f-a703-f3e2a5ab12fa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-46805", "description": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46805", "source_name": "cve", "external_id": "CVE-2023-46805"}]}, {"type": "relationship", "id": "relationship--b890c17c-8800-4a8a-bfad-e6c9cd4e54aa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4c89deba-d462-4e5f-a703-f3e2a5ab12fa", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6014651e-4b47-4991-8753-8aa1d82280a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4c89deba-d462-4e5f-a703-f3e2a5ab12fa", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--6d13ff03-ca19-43cc-8722-e7d646b669f8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c89deba-d462-4e5f-a703-f3e2a5ab12fa", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--b4f7c1ae-197d-443b-97c0-4f538abb9104", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4c89deba-d462-4e5f-a703-f3e2a5ab12fa", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--5a68ba0f-6558-4325-b606-b12a0b2cdeaa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-42793", "description": "JetBrains TeamCity Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42793", "source_name": "cve", "external_id": "CVE-2023-42793"}]}, {"type": "relationship", "id": "relationship--c15d4d89-2960-4b17-95f0-0fc727d65b39", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5a68ba0f-6558-4325-b606-b12a0b2cdeaa", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b1b6d8fb-a912-42d3-8cc7-091418ddcfbd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5a68ba0f-6558-4325-b606-b12a0b2cdeaa", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "vulnerability", "id": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-38035", "description": "Ivanti Sentry Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38035", "source_name": "cve", "external_id": "CVE-2023-38035"}]}, {"type": "relationship", "id": "relationship--ec42a57c-ebc2-4bdf-a2c8-d756a02c9039", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--40c486bc-5720-45d2-b182-ead617699628", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--89c485b2-f5ad-498e-9a63-8d0ff129a829", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--4288f071-6ef7-4f24-85ad-96d31000fb52", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--b18eae87-b469-4e14-b454-b171b416bc18"}, {"type": "relationship", "id": "relationship--b320c1dd-3647-48fb-b1e6-834d5ddd3ef2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--f61347f2-44b4-467a-8593-545a267a69ba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--ef2c6294-1483-438a-99d6-a9f9d1a15759", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--e358d692-23c0-4a31-9eb6-ecc13a8d7735"}, {"type": "relationship", "id": "relationship--d7d60630-f61e-40ec-a2de-6d4b91b44c08", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--6328d0f8-4460-4b2b-972a-b63b59646843", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8d2e780a-30be-432a-8730-1eaf10112372", "target_ref": "attack-pattern--650c784b-7504-4df7-ab2c-4ea882384d1e"}, {"type": "vulnerability", "id": "vulnerability--41ab7bc5-7bde-4bde-bba8-6a44319e3ccd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-35078", "description": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35078", "source_name": "cve", "external_id": "CVE-2023-35078"}]}, {"type": "relationship", "id": "relationship--e0c3f8bb-fc92-45a4-a73b-d407780737f2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--41ab7bc5-7bde-4bde-bba8-6a44319e3ccd", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--161fe5c1-900b-41ad-a540-f2b8f23b4a0f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--41ab7bc5-7bde-4bde-bba8-6a44319e3ccd", "target_ref": "attack-pattern--d28ef391-8ed4-45dc-bc4a-2f43abf54416"}, {"type": "relationship", "id": "relationship--c2d9e977-ff53-4ff3-b217-fd12017f6ad8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--41ab7bc5-7bde-4bde-bba8-6a44319e3ccd", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "vulnerability", "id": "vulnerability--461c2cd4-4933-43ef-b06a-99536c9dc387", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-20867", "description": "VMware Tools Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20867", "source_name": "cve", "external_id": "CVE-2023-20867"}]}, {"type": "relationship", "id": "relationship--98df7c05-152a-4fb0-a9a2-892cff0d6048", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--461c2cd4-4933-43ef-b06a-99536c9dc387", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f871ff38-fd86-4271-bb8e-31d104a58051", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--461c2cd4-4933-43ef-b06a-99536c9dc387", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--97eb9551-fee0-49d2-8685-5669c053e0cf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--461c2cd4-4933-43ef-b06a-99536c9dc387", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--8ec29d72-dc69-4e87-8452-f7e0a78d754d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-40684", "description": "Fortinet Multiple Products Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40684", "source_name": "cve", "external_id": "CVE-2022-40684"}]}, {"type": "relationship", "id": "relationship--c48de36c-d46e-4a0a-a989-7d3e925b3ad2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8ec29d72-dc69-4e87-8452-f7e0a78d754d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--120c51fb-afb9-493e-ac0d-c5d66a9225a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8ec29d72-dc69-4e87-8452-f7e0a78d754d", "target_ref": "attack-pattern--6b57dc31-b814-4a03-8706-28bc20d739c4"}, {"type": "vulnerability", "id": "vulnerability--104778c1-7563-4c68-bac8-3a42a2d3b78a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-23131", "description": "Zabbix Frontend Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23131", "source_name": "cve", "external_id": "CVE-2022-23131"}]}, {"type": "relationship", "id": "relationship--ae58d3fd-bf85-4392-9ae0-c7137a05a49a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--104778c1-7563-4c68-bac8-3a42a2d3b78a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8dae182b-e66e-48b2-b73f-718e7d2d741f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--104778c1-7563-4c68-bac8-3a42a2d3b78a", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--6b884b8f-304b-4fa6-9c3c-03f3ece009e5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--104778c1-7563-4c68-bac8-3a42a2d3b78a", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--422c27e6-ddc8-4d5a-8632-339b551f446e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--104778c1-7563-4c68-bac8-3a42a2d3b78a", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "vulnerability", "id": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-1040", "description": "Sophos Firewall Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1040", "source_name": "cve", "external_id": "CVE-2022-1040"}]}, {"type": "relationship", "id": "relationship--3e58f759-4559-4902-9f03-710d959a7bba", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f14fdfb5-b628-4f81-a8c3-0c628efe2985", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--6190a23b-d9e7-45ed-a548-99aaad57aa89", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--2176a753-8347-4bd6-97b5-aa2ea23a6362", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--3257eb21-f9a7-4430-8de1-d8b6e288f529"}, {"type": "relationship", "id": "relationship--d4aa1d55-0ef1-4945-9dc8-624e900f622c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "relationship", "id": "relationship--fae6a37d-a9f6-4d7f-ae95-546c0253dff2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--778b88c6-e424-4780-a999-354bd87eb6a1", "target_ref": "attack-pattern--035bb001-ab69-4a0b-9f6c-2de8b09e1b9d"}, {"type": "vulnerability", "id": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-44515", "description": "Zoho Desktop Central Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44515", "source_name": "cve", "external_id": "CVE-2021-44515"}]}, {"type": "relationship", "id": "relationship--2db4e451-942d-47e1-be70-a12483a34163", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4ac6ec0b-0a93-4a9b-a7cd-bd2f0057258a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--d215c3a4-7a92-497f-98ff-2b3e3805ba89", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "target_ref": "attack-pattern--15dbf668-795c-41e6-8219-f0447c0e64ce"}, {"type": "relationship", "id": "relationship--5b7dd085-d400-49aa-89f9-255d80c4d0ed", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--696e89b8-8148-488a-b9a6-4ce9913bdb25", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9d21141f-a512-4827-821f-41cc47c91b1d", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-40539", "description": "Zoho ManageEngine ADSelfService Plus Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40539", "source_name": "cve", "external_id": "CVE-2021-40539"}]}, {"type": "relationship", "id": "relationship--3561657d-f0f4-451f-b899-e78b1f3c8aff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--7086b191-42c2-4ce2-8cd2-60e980654893", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7d9a4c29-e758-42b2-93a8-786cbf101ac2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--24bfaeba-cb0d-4525-b3dc-507c77ecec41"}, {"type": "relationship", "id": "relationship--7a247b63-c990-41f6-9dd2-127743d08346", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--00f90846-cbd1-4fc5-9233-df5c2bf2a662"}, {"type": "relationship", "id": "relationship--13442dc9-9bb8-4eb5-8be1-36bb6f5e3f27", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--d63a3fb8-9452-4e9d-a60a-54be68d5998c"}, {"type": "relationship", "id": "relationship--bfca9e3a-6c4e-4ea5-97a7-f80b43e35f7b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--01a5a209-b94c-450b-b7f9-946497d91055"}, {"type": "relationship", "id": "relationship--89f87506-607a-4efe-bc1b-52fa1f4a7747", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--e68ee112-69f8-4ef5-a0dc-c68da3990331", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "relationship", "id": "relationship--ff085d58-b070-4c1b-b66f-dd9f03b1d7e0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--457c7820-d331-465a-915e-42f85500ccc4"}, {"type": "relationship", "id": "relationship--7303d901-59bc-4892-8ba2-bf15e6d49e84", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--b2394237-07a3-4fd4-a5f2-736b2b7b7adc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--3ccef7ae-cb5e-48f6-8302-897105fbf55c"}, {"type": "relationship", "id": "relationship--8a1cf487-6e49-449f-a1c5-cc13a6ffb3a7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--b3d682b6-98f2-4fb0-aa3b-b4df007ca70a"}, {"type": "relationship", "id": "relationship--f60f10cd-072c-45ab-8b89-e5159ac76c83", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--e0116c44-e391-4166-b9f7-403c4ff658fb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dcefbea-a808-485d-b76f-c22cad66cbd6", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--3afebbf1-447c-4f2f-a36e-4df8ee9b0275", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-39226", "description": "Grafana Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39226", "source_name": "cve", "external_id": "CVE-2021-39226"}]}, {"type": "relationship", "id": "relationship--aa533fd6-d9eb-4b74-9e1c-05fd97473d0c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3afebbf1-447c-4f2f-a36e-4df8ee9b0275", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4e911c33-2af3-4b3f-bb34-be4b23cb44a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3afebbf1-447c-4f2f-a36e-4df8ee9b0275", "target_ref": "attack-pattern--d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c"}, {"type": "vulnerability", "id": "vulnerability--875e65fb-8f0f-46b6-b36a-8e407846a30c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-37415", "description": "Zoho ManageEngine ServiceDesk Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37415", "source_name": "cve", "external_id": "CVE-2021-37415"}]}, {"type": "relationship", "id": "relationship--614637fb-24a2-445f-9475-d5f24907a136", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--875e65fb-8f0f-46b6-b36a-8e407846a30c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ba7731a1-7764-4833-a1e4-fa27d4c1c6f6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-8193", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Authorization Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8193", "source_name": "cve", "external_id": "CVE-2020-8193"}]}, {"type": "relationship", "id": "relationship--a49952f8-61c0-407d-a597-7491023c33d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ba7731a1-7764-4833-a1e4-fa27d4c1c6f6", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "relationship", "id": "relationship--cbaae2ca-e2e7-4cbc-b3da-24cab4a99ec4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ba7731a1-7764-4833-a1e4-fa27d4c1c6f6", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--1d308d54-0ff0-417a-b673-6b544ef2b608", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-12812", "description": "Fortinet FortiOS SSL VPN Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12812", "source_name": "cve", "external_id": "CVE-2020-12812"}]}, {"type": "relationship", "id": "relationship--661e5862-9593-4b2e-ae5a-d97223d1de79", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1d308d54-0ff0-417a-b673-6b544ef2b608", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "relationship", "id": "relationship--40f8bae5-ebb2-4a1b-8a52-f42ad6d5a342", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1d308d54-0ff0-417a-b673-6b544ef2b608", "target_ref": "attack-pattern--f4c1826f-a322-41cd-9557-562100848c84"}, {"type": "vulnerability", "id": "vulnerability--e2dc248c-dde6-4a5a-a1da-89b941af0f6c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0632", "description": "Adobe ColdFusion Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0632", "source_name": "cve", "external_id": "CVE-2013-0632"}]}, {"type": "relationship", "id": "relationship--d2e636a0-9700-470f-84b7-bb5c80a5facb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e2dc248c-dde6-4a5a-a1da-89b941af0f6c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--b226c33e-0e27-410d-b387-e10515622e71", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0625", "description": "Adobe ColdFusion Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0625", "source_name": "cve", "external_id": "CVE-2013-0625"}]}, {"type": "relationship", "id": "relationship--8d629d84-d2a9-449f-b083-691f9634bc88", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b226c33e-0e27-410d-b387-e10515622e71", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--72c78a6d-4e0d-46a6-89d9-d0e352b270b0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-0108", "description": "Palo Alto Networks PAN-OS Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0108", "source_name": "cve", "external_id": "CVE-2025-0108"}]}, {"type": "relationship", "id": "relationship--1452a937-556f-438d-b845-1ad005521ec3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--72c78a6d-4e0d-46a6-89d9-d0e352b270b0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--04567fab-daf9-4361-888d-80baf6a7bbe6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--72c78a6d-4e0d-46a6-89d9-d0e352b270b0", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--e8583676-f347-44e9-847c-5f0fcb1706b2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--72c78a6d-4e0d-46a6-89d9-d0e352b270b0", "target_ref": "attack-pattern--1cfcb312-b8d7-47a4-b560-4b16cc677292"}, {"type": "vulnerability", "id": "vulnerability--7bd5e255-6586-4d70-9a8e-aaaec7af62a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-55591", "description": "Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55591", "source_name": "cve", "external_id": "CVE-2024-55591"}]}, {"type": "relationship", "id": "relationship--3a369892-a04c-4477-9b7d-6735738e1c0f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7bd5e255-6586-4d70-9a8e-aaaec7af62a6", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--84872402-f7d1-492b-b09a-f3018f7f262d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7bd5e255-6586-4d70-9a8e-aaaec7af62a6", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--37e49df7-c8da-4ab8-9d4c-2837b76dfa3b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7bd5e255-6586-4d70-9a8e-aaaec7af62a6", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--308a9343-d0d6-4aef-bc6b-ebdaea41c50b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7bd5e255-6586-4d70-9a8e-aaaec7af62a6", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "vulnerability", "id": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-54085", "description": "AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54085", "source_name": "cve", "external_id": "CVE-2024-54085"}]}, {"type": "relationship", "id": "relationship--7bc151e7-084f-432b-8a4a-074ed92a2d61", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--3275c375-001b-4776-9cd8-5b0bd583256c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "target_ref": "attack-pattern--f5bb433e-bdf6-4781-84bc-35e97e43be89"}, {"type": "relationship", "id": "relationship--d51cbc56-a9bc-4b5b-8dba-5de3a26dc073", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--c1090271-a9e7-4d44-891c-f29b316ff942", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "relationship", "id": "relationship--9f4600de-6844-4a3f-b6b0-a2771096f52a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b0ed9cb8-08a0-4c9b-8982-8890733fa32b", "target_ref": "attack-pattern--c675646d-e204-4aa8-978d-e3d6d65885c4"}, {"type": "vulnerability", "id": "vulnerability--c73946a1-5471-4fd7-b712-bd8a86981acb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-43939", "description": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43939", "source_name": "cve", "external_id": "CVE-2022-43939"}]}, {"type": "relationship", "id": "relationship--80d3148c-3cb3-4140-80aa-2c42d164edbb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c73946a1-5471-4fd7-b712-bd8a86981acb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--e27bdc93-b4ca-4e3a-b9ec-85703ce743ce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c73946a1-5471-4fd7-b712-bd8a86981acb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--6986b202-4b27-4578-b959-98ca568499b5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-32030", "description": "ASUS Routers Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32030", "source_name": "cve", "external_id": "CVE-2021-32030"}]}, {"type": "relationship", "id": "relationship--ea3aee6e-d2b4-4d92-9c11-f2416c6450b1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6986b202-4b27-4578-b959-98ca568499b5", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--9a697114-7cf8-489c-b5c0-dfdf7d8e1089", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6986b202-4b27-4578-b959-98ca568499b5", "target_ref": "attack-pattern--3257eb21-f9a7-4430-8de1-d8b6e288f529"}, {"type": "relationship", "id": "relationship--8322ac45-d602-4bf0-8832-2c6aa9f25994", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6986b202-4b27-4578-b959-98ca568499b5", "target_ref": "attack-pattern--a10641f4-87b4-45a3-a906-92a149cb2c27"}, {"type": "vulnerability", "id": "vulnerability--5cdfe18d-b850-49bd-954d-686cefd1874d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-54309", "description": "CrushFTP Unprotected Alternate Channel Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54309", "source_name": "cve", "external_id": "CVE-2025-54309"}]}, {"type": "relationship", "id": "relationship--3e31394a-2e1f-4a67-b12d-834d386d519d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--5cdfe18d-b850-49bd-954d-686cefd1874d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--17473501-3485-4a4f-b749-5ff74cd2a7a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--5cdfe18d-b850-49bd-954d-686cefd1874d", "target_ref": "attack-pattern--40597f16-0963-4249-bf4c-ac93b7fb9807"}, {"type": "relationship", "id": "relationship--d07884da-26fd-4e84-ad89-4cf8cd18cf9a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--5cdfe18d-b850-49bd-954d-686cefd1874d", "target_ref": "attack-pattern--54a649ff-439a-41a4-9856-8d144a2551ba"}, {"type": "vulnerability", "id": "vulnerability--ae42a6f6-db3b-4c55-b30f-968433a4d63f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-4427", "description": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4427", "source_name": "cve", "external_id": "CVE-2025-4427"}]}, {"type": "relationship", "id": "relationship--ba082002-fe38-4bf9-92c5-398d0b8d64fa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ae42a6f6-db3b-4c55-b30f-968433a4d63f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--39aa9c70-304e-48eb-a559-4c3cac5aba0b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ae42a6f6-db3b-4c55-b30f-968433a4d63f", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--bd3b1c63-6f56-4eb5-b989-5eb6fb1bee33", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ae42a6f6-db3b-4c55-b30f-968433a4d63f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--80f4952b-b1e5-4ad9-9efb-8955022251e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ae42a6f6-db3b-4c55-b30f-968433a4d63f", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--0e355745-d2a7-4fde-97f0-05adb650f841", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-31161", "description": "CrushFTP Authentication Bypass Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31161", "source_name": "cve", "external_id": "CVE-2025-31161"}]}, {"type": "relationship", "id": "relationship--bd8c4e99-dc9f-4c48-a80e-96bcdf463658", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0e355745-d2a7-4fde-97f0-05adb650f841", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--ddcd04fc-ee50-423a-8356-818e03f51752", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0e355745-d2a7-4fde-97f0-05adb650f841", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cc47804c-98cc-430c-89c4-b3825e3262c6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0e355745-d2a7-4fde-97f0-05adb650f841", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "vulnerability", "id": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-24919", "description": "Check Point Quantum Security Gateways Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24919", "source_name": "cve", "external_id": "CVE-2024-24919"}]}, {"type": "relationship", "id": "relationship--9550c2e8-8e86-4763-a335-ca3a84581bf5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--cb4885f7-3767-4c4e-8b9f-aa2bb79d92be", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "target_ref": "attack-pattern--edf91964-b26e-4b4a-9600-ccacd7d7df24"}, {"type": "relationship", "id": "relationship--028e6607-4db4-47bb-985d-7708230970c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "target_ref": "attack-pattern--d0b4fcdb-d67d-4ed2-99ce-788b12f8c0f4"}, {"type": "relationship", "id": "relationship--69c6daa0-d207-4f30-91ba-764d9b8077be", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--599677db-046b-46b7-aa12-aa6ea161c421", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a89fec4a-ef90-4fc4-995d-e0a124c3fca7", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--58587fc5-f80f-4acd-a3e5-fa936b9826ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-49103", "description": "ownCloud graphapi Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-49103", "source_name": "cve", "external_id": "CVE-2023-49103"}]}, {"type": "relationship", "id": "relationship--d5919f1f-e3f9-405f-8078-891903ef707f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--58587fc5-f80f-4acd-a3e5-fa936b9826ee", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--50398bc9-6c27-4423-8c74-843913143f20", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--58587fc5-f80f-4acd-a3e5-fa936b9826ee", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "relationship", "id": "relationship--8e476662-0a4e-4aad-8bd2-ce787fde9d91", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--58587fc5-f80f-4acd-a3e5-fa936b9826ee", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--268ac792-f293-4b8e-99ad-4a70739e54da", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-38205", "description": "Adobe ColdFusion Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38205", "source_name": "cve", "external_id": "CVE-2023-38205"}]}, {"type": "relationship", "id": "relationship--0b9c9b24-f7ce-4f66-8907-a6abe36e5c4e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--268ac792-f293-4b8e-99ad-4a70739e54da", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--c5de87b1-e448-464d-a8ae-31be0ddfa89d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-29298", "description": "Adobe ColdFusion Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29298", "source_name": "cve", "external_id": "CVE-2023-29298"}]}, {"type": "relationship", "id": "relationship--4602383d-80b2-4bcf-aff7-7ccd9d1b68c6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c5de87b1-e448-464d-a8ae-31be0ddfa89d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--4ac80275-350a-4fb6-b0bc-9369206b49ee", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-27350", "description": "PaperCut MF/NG Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27350", "source_name": "cve", "external_id": "CVE-2023-27350"}]}, {"type": "relationship", "id": "relationship--b7dd43b8-8362-4b03-93eb-5715f0299d81", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4ac80275-350a-4fb6-b0bc-9369206b49ee", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--b9377f16-d76d-4985-9157-1a1693d7719a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4ac80275-350a-4fb6-b0bc-9369206b49ee", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--b257751a-b363-4d7d-8ae4-7421351d0c54", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4ac80275-350a-4fb6-b0bc-9369206b49ee", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--4644bc6f-fc88-483b-96b4-f982a0feb011", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-22518", "description": "Atlassian Confluence Data Center and Server Improper Authorization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22518", "source_name": "cve", "external_id": "CVE-2023-22518"}]}, {"type": "relationship", "id": "relationship--79b08070-4e36-4a7e-9b3b-a6220c4a5ffe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4644bc6f-fc88-483b-96b4-f982a0feb011", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--2cc3169a-fa34-4f6f-a5a5-f61b1050e4fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4644bc6f-fc88-483b-96b4-f982a0feb011", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--965ec421-edd1-40f1-8e10-484c6801a39f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4644bc6f-fc88-483b-96b4-f982a0feb011", "target_ref": "attack-pattern--03d7999c-1f4c-42cc-8373-e7690d318104"}, {"type": "vulnerability", "id": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-22515", "description": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22515", "source_name": "cve", "external_id": "CVE-2023-22515"}]}, {"type": "relationship", "id": "relationship--e48af705-3010-4374-aec6-ca1b1246842c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--71369eab-198a-48d8-a42a-fb097bf73c03", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--d6b3cc81-4c28-4700-927a-c22a8059563e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--086d4bac-2c2c-4d56-b847-8122d98bc062", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--50c283f4-1c3d-4d49-a843-9de2bebc4f58", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7ddd60e3-39ef-4c5e-a56d-aa62b08dff1f", "target_ref": "attack-pattern--e01be9c5-e763-4caf-aeb7-000b416aef67"}, {"type": "vulnerability", "id": "vulnerability--60945bff-e663-47ac-8b46-c5bea96fdfaf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-44168", "description": "Fortinet FortiOS Arbitrary File Download", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44168", "source_name": "cve", "external_id": "CVE-2021-44168"}]}, {"type": "relationship", "id": "relationship--79ec4394-0615-4ad0-a7d4-bd1b1c0926cd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--60945bff-e663-47ac-8b46-c5bea96fdfaf", "target_ref": "attack-pattern--fdc47f44-dd32-4b99-af5f-209f556f63c2"}, {"type": "relationship", "id": "relationship--46dff2b9-8c1b-4d70-8de1-292a5a8e177b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--60945bff-e663-47ac-8b46-c5bea96fdfaf", "target_ref": "attack-pattern--ae7f3575-0a5e-427e-991b-fe03ad44c754"}, {"type": "vulnerability", "id": "vulnerability--b5c3b7d2-fb1f-47f0-834a-2281ddd533a0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-40655", "description": "D-Link DIR-605 Router Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40655", "source_name": "cve", "external_id": "CVE-2021-40655"}]}, {"type": "relationship", "id": "relationship--e33b9f00-74fc-463b-baca-626e4e0cd18b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b5c3b7d2-fb1f-47f0-834a-2281ddd533a0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--2f939cc2-3d46-4023-bdc4-63e32eb6a5cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-26085", "description": "Atlassian Confluence Server Pre-Authorization Arbitrary File Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26085", "source_name": "cve", "external_id": "CVE-2021-26085"}]}, {"type": "relationship", "id": "relationship--98d63141-e9e0-43bb-994a-da08a4e0e0f2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2f939cc2-3d46-4023-bdc4-63e32eb6a5cb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--a6dc1a97-cb45-4d77-840d-49c5360ee6ad", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2f939cc2-3d46-4023-bdc4-63e32eb6a5cb", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--cb9cbc43-9076-459f-929e-228636116f2a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-22017", "description": "VMware vCenter Server Improper Access Control", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22017", "source_name": "cve", "external_id": "CVE-2021-22017"}]}, {"type": "relationship", "id": "relationship--e851b954-59c3-4edb-9b88-7d6dbb4eb3c2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cb9cbc43-9076-459f-929e-228636116f2a", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--9b4fb0df-e3de-4ee7-8106-6bd16fca82d8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cb9cbc43-9076-459f-929e-228636116f2a", "target_ref": "attack-pattern--f6dacc85-b37d-458e-b58d-74fc4bbf5755"}, {"type": "vulnerability", "id": "vulnerability--b78ff915-5dce-47aa-83ad-7572d21b2671", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-8196", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8196", "source_name": "cve", "external_id": "CVE-2020-8196"}]}, {"type": "relationship", "id": "relationship--8bba9c9d-743d-4a6c-a3dc-939c4f68a305", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b78ff915-5dce-47aa-83ad-7572d21b2671", "target_ref": "attack-pattern--bb5a00de-e086-4859-a231-fa793f6797e2"}, {"type": "relationship", "id": "relationship--ca3a89f5-d179-4bde-b3c7-82d8960f1b1e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b78ff915-5dce-47aa-83ad-7572d21b2671", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--04ad8fa8-0794-4feb-97fa-dead8837245b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b78ff915-5dce-47aa-83ad-7572d21b2671", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--fa80ca9e-ba2a-495f-afdd-3bbdc7745410", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-8195", "description": "Citrix ADC, Gateway, and SD-WAN WANOP Appliance Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8195", "source_name": "cve", "external_id": "CVE-2020-8195"}]}, {"type": "relationship", "id": "relationship--c733f0ec-a836-4e51-ac40-fffbbd8db6fa", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fa80ca9e-ba2a-495f-afdd-3bbdc7745410", "target_ref": "attack-pattern--bb5a00de-e086-4859-a231-fa793f6797e2"}, {"type": "relationship", "id": "relationship--c1bb9764-4157-4594-a961-48bae5f245fe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa80ca9e-ba2a-495f-afdd-3bbdc7745410", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--4db1bda4-5380-4ea6-81a6-1af33c8eca65", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--fa80ca9e-ba2a-495f-afdd-3bbdc7745410", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--b64f84a3-b4cb-4dd0-8274-dedda2317cc5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-1653", "description": "Cisco Small Business RV320 and RV325 Routers Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1653", "source_name": "cve", "external_id": "CVE-2019-1653"}]}, {"type": "relationship", "id": "relationship--60535a8d-a644-4bce-b5bb-40dd6848de0d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b64f84a3-b4cb-4dd0-8274-dedda2317cc5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--9c7ab69c-8c8f-465b-9489-82ada9c6e36b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b64f84a3-b4cb-4dd0-8274-dedda2317cc5", "target_ref": "attack-pattern--322bad5a-1c49-4d23-ab79-76d641794afa"}, {"type": "relationship", "id": "relationship--276addbe-cbd1-47cc-a38f-30249762ec3b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b64f84a3-b4cb-4dd0-8274-dedda2317cc5", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--8268ee96-939c-4101-a539-1646bc4c528a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--b64f84a3-b4cb-4dd0-8274-dedda2317cc5", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--49af6c6e-9528-43cb-8619-1e07c5621fe5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-11510", "description": "Ivanti Pulse Connect Secure Arbitrary File Read Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11510", "source_name": "cve", "external_id": "CVE-2019-11510"}]}, {"type": "relationship", "id": "relationship--69b3a936-6625-4c3d-b20e-e86cf617f8eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--49af6c6e-9528-43cb-8619-1e07c5621fe5", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--cfad35b4-4f72-4f45-ba18-bc3981e36b22", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49af6c6e-9528-43cb-8619-1e07c5621fe5", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--8b1707d1-2951-4193-99da-01ad48c35d2d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--49af6c6e-9528-43cb-8619-1e07c5621fe5", "target_ref": "attack-pattern--837f9164-50af-4ac0-8219-379d8a74cefc"}, {"type": "relationship", "id": "relationship--89a38762-d636-4353-a804-fb8c2c4e4104", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--49af6c6e-9528-43cb-8619-1e07c5621fe5", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--3724cc05-dc5c-4081-a579-70682dc7e9a2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0631", "description": "Adobe ColdFusion Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0631", "source_name": "cve", "external_id": "CVE-2013-0631"}]}, {"type": "relationship", "id": "relationship--8db7848c-46d7-46e0-bcf3-e8b77dff3725", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--3724cc05-dc5c-4081-a579-70682dc7e9a2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7bf55b1a-820e-4724-ab8e-6ca1dfa60c79", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3724cc05-dc5c-4081-a579-70682dc7e9a2", "target_ref": "attack-pattern--09312b1a-c3c6-4b45-9844-3ccc78e5d82f"}, {"type": "vulnerability", "id": "vulnerability--a436cd60-7d55-4963-8721-a24db6ae4aca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2009-3960", "description": "Adobe BlazeDS Information Disclosure Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3960", "source_name": "cve", "external_id": "CVE-2009-3960"}]}, {"type": "relationship", "id": "relationship--1d0eaa3e-ec3d-4cdb-918c-c6f5147f0db7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a436cd60-7d55-4963-8721-a24db6ae4aca", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--13344ccf-7581-4ec3-89ff-6f31bf93da78", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a436cd60-7d55-4963-8721-a24db6ae4aca", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "vulnerability", "id": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-53704", "description": "SonicWall SonicOS SSLVPN Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53704", "source_name": "cve", "external_id": "CVE-2024-53704"}]}, {"type": "relationship", "id": "relationship--773d1c04-8ac3-4c76-9434-06bdebf4826f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "target_ref": "attack-pattern--9fa07bef-9c81-421e-a8e5-ad4366c5a925"}, {"type": "relationship", "id": "relationship--3c2becfd-29d8-4d1d-adaa-fb86d287889a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "target_ref": "attack-pattern--9c306d8d-cde7-4b4c-b6e8-d0bb16caca36"}, {"type": "relationship", "id": "relationship--a3c8b3d0-eab9-412b-8408-eb06a053cf06", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "target_ref": "attack-pattern--f232fa7a-025c-4d43-abc7-318e81a73d65"}, {"type": "relationship", "id": "relationship--1822256e-3ac0-4c61-bd08-527684db3abc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--804bcf87-cc9b-46a7-a94b-7609628545de", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c1f484fa-9504-40fe-bd88-4f2cbcac322c", "target_ref": "attack-pattern--eb062747-2193-45de-8fa2-e62549c37ddf"}, {"type": "vulnerability", "id": "vulnerability--33a2eb76-903b-47ce-aa3b-4a2b0b79997a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-49035", "description": "Microsoft Partner Center Improper Access Control Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-49035", "source_name": "cve", "external_id": "CVE-2024-49035"}]}, {"type": "relationship", "id": "relationship--2c17c637-0c80-40d9-8e2c-b3de2b66c4bd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--33a2eb76-903b-47ce-aa3b-4a2b0b79997a", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--9017d0cf-36fe-4274-934d-e655254f03e6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--33a2eb76-903b-47ce-aa3b-4a2b0b79997a", "target_ref": "attack-pattern--3298ce88-1628-43b1-87d9-0b5336b193d7"}, {"type": "relationship", "id": "relationship--963d5720-f9b9-4291-af78-65b69c31c4cd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--33a2eb76-903b-47ce-aa3b-4a2b0b79997a", "target_ref": "attack-pattern--3f18edba-28f4-4bb9-82c3-8aa60dcac5f7"}, {"type": "vulnerability", "id": "vulnerability--ad08ad26-b7aa-46e0-ad41-01ed0ef394f4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-49706", "description": "Microsoft SharePoint Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49706", "source_name": "cve", "external_id": "CVE-2025-49706"}]}, {"type": "relationship", "id": "relationship--d1273243-6585-4187-a49f-1b23db0919b7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ad08ad26-b7aa-46e0-ad41-01ed0ef394f4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--268d48ae-730f-4059-945f-3c8cd08e0d2d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ad08ad26-b7aa-46e0-ad41-01ed0ef394f4", "target_ref": "attack-pattern--d456de47-a16f-4e46-8980-e67478a12dcb"}, {"type": "relationship", "id": "relationship--9bb2894c-542c-4e12-835a-80e8fc6d262a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad08ad26-b7aa-46e0-ad41-01ed0ef394f4", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "vulnerability", "id": "vulnerability--c0d7b7b7-ca5e-4b9d-8f94-a0220df5d904", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-3935", "description": "ConnectWise ScreenConnect Improper Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3935", "source_name": "cve", "external_id": "CVE-2025-3935"}]}, {"type": "relationship", "id": "relationship--8b25d6bf-e822-4b22-b3e2-2bc66fd580bf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c0d7b7b7-ca5e-4b9d-8f94-a0220df5d904", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--64a3f877-da77-4812-b35b-84f7d71de90c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c0d7b7b7-ca5e-4b9d-8f94-a0220df5d904", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a457a372-6d0b-4349-a8a3-69b2047e9e76", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-20353", "description": "Cisco ASA and FTD Denial of Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20353", "source_name": "cve", "external_id": "CVE-2024-20353"}]}, {"type": "relationship", "id": "relationship--535b411d-f3ff-4930-bcb7-22a56a617237", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a457a372-6d0b-4349-a8a3-69b2047e9e76", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--c5495f2f-2eb9-4d31-85f0-12b3292f86f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a457a372-6d0b-4349-a8a3-69b2047e9e76", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "relationship", "id": "relationship--b910c449-7211-4337-9a74-4c8983a91be1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a457a372-6d0b-4349-a8a3-69b2047e9e76", "target_ref": "attack-pattern--ea071aa0-8f17-416f-ab0d-2bab7e79003d"}, {"type": "relationship", "id": "relationship--1ab5aab0-95dd-4b71-b305-d43f5a1c7f96", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--a457a372-6d0b-4349-a8a3-69b2047e9e76", "target_ref": "attack-pattern--03259939-0b57-482f-8eb5-87c0e0d54334"}, {"type": "vulnerability", "id": "vulnerability--2805076c-284d-4854-9d62-7c3d02a54557", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-0028", "description": "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0028", "source_name": "cve", "external_id": "CVE-2022-0028"}]}, {"type": "relationship", "id": "relationship--d49fd3ae-e587-4898-a2d5-e14ac68bf66b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2805076c-284d-4854-9d62-7c3d02a54557", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--4f5551f5-8633-4d22-80fe-4d8fa4a6b62c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2805076c-284d-4854-9d62-7c3d02a54557", "target_ref": "attack-pattern--d74c4a7e-ffbf-432f-9365-7ebf1f787cab"}, {"type": "vulnerability", "id": "vulnerability--be3c3619-83c7-4ca9-a2bd-c72467216c69", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-0296", "description": "Cisco Adaptive Security Appliance (ASA) Denial-of-Service Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0296", "source_name": "cve", "external_id": "CVE-2018-0296"}]}, {"type": "relationship", "id": "relationship--c06bdba6-3862-4f4f-bc95-6c6d89251e85", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--be3c3619-83c7-4ca9-a2bd-c72467216c69", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--5f3f8866-0f93-44c5-8f51-1ac24182d8ec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--be3c3619-83c7-4ca9-a2bd-c72467216c69", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--4759a09d-2f8b-4350-8e84-d39880d850ae", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-6548", "description": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6548", "source_name": "cve", "external_id": "CVE-2023-6548"}]}, {"type": "relationship", "id": "relationship--75cc26aa-3585-4ef4-92af-085a98ffbfa0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4759a09d-2f8b-4350-8e84-d39880d850ae", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "vulnerability", "id": "vulnerability--87aa824f-98d5-4c74-b6cd-4fe42b72101c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-3519", "description": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3519", "source_name": "cve", "external_id": "CVE-2023-3519"}]}, {"type": "relationship", "id": "relationship--7e0021b2-aeb1-4792-b907-0842ab604993", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--87aa824f-98d5-4c74-b6cd-4fe42b72101c", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--11ed5e6e-3437-438f-ac08-9b204e375c75", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--87aa824f-98d5-4c74-b6cd-4fe42b72101c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--33916bf6-b2f1-4539-b384-756fae77d3f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--87aa824f-98d5-4c74-b6cd-4fe42b72101c", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--5e114c39-ff5a-4662-a44c-5214dc7f7891", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--87aa824f-98d5-4c74-b6cd-4fe42b72101c", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--73fe550a-0f8e-454e-a8b2-fea7168ae819", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22947", "description": "VMware Spring Cloud Gateway Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22947", "source_name": "cve", "external_id": "CVE-2022-22947"}]}, {"type": "relationship", "id": "relationship--ea9c5ca0-065c-498c-a6a8-34c97b6b1b18", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--73fe550a-0f8e-454e-a8b2-fea7168ae819", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--14b1420e-bc67-4174-9800-059dca6ff53a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--73fe550a-0f8e-454e-a8b2-fea7168ae819", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--999492c3-a5b8-4755-a13f-8f6a48096ff9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--73fe550a-0f8e-454e-a8b2-fea7168ae819", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "vulnerability", "id": "vulnerability--f3dde2aa-7e49-4af6-b2b3-c17fa27b7bd1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-44529", "description": "Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) Code Injection Vulnerability ", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44529", "source_name": "cve", "external_id": "CVE-2021-44529"}]}, {"type": "relationship", "id": "relationship--d8e51430-360f-494a-a01f-979843dbb5e4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f3dde2aa-7e49-4af6-b2b3-c17fa27b7bd1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--99658dd2-2226-4401-ac03-7b75540a9720", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f3dde2aa-7e49-4af6-b2b3-c17fa27b7bd1", "target_ref": "attack-pattern--bd369cd9-abb8-41ce-b5bb-fff23ee86c00"}, {"type": "vulnerability", "id": "vulnerability--11f989b7-46db-48bd-a3ab-10a9fa9d2527", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-21590", "description": "Juniper Junos OS Improper Isolation or Compartmentalization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21590", "source_name": "cve", "external_id": "CVE-2025-21590"}]}, {"type": "relationship", "id": "relationship--29d9bd0e-5660-45ca-b443-544b91af1380", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--11f989b7-46db-48bd-a3ab-10a9fa9d2527", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--99c90de6-7c7b-4c3c-b192-5107e7b8a30a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--11f989b7-46db-48bd-a3ab-10a9fa9d2527", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--b824cbdc-60fb-4f4c-a174-da52db2d7a2d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-56145", "description": "Craft CMS Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56145", "source_name": "cve", "external_id": "CVE-2024-56145"}]}, {"type": "relationship", "id": "relationship--e12646ab-9efe-497f-97b6-630540611745", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--b824cbdc-60fb-4f4c-a174-da52db2d7a2d", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--b04a2bab-5bca-41bd-9fcd-4f50031fd207", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--b824cbdc-60fb-4f4c-a174-da52db2d7a2d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--f906b314-fb6c-4648-943a-ba117680b2e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-43769", "description": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-43769", "source_name": "cve", "external_id": "CVE-2022-43769"}]}, {"type": "relationship", "id": "relationship--8a1e6eea-3eed-4fae-96f1-a5d10244534b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f906b314-fb6c-4648-943a-ba117680b2e1", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--01e14e5a-ee2d-43b2-abe5-2da5ea8d4b02", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f906b314-fb6c-4648-943a-ba117680b2e1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d1557ab7-2985-47d5-acf6-8f89b9b961b6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-49704", "description": "Microsoft SharePoint Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49704", "source_name": "cve", "external_id": "CVE-2025-49704"}]}, {"type": "relationship", "id": "relationship--63891f57-3f78-4c25-ac73-c1503d122c3f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d1557ab7-2985-47d5-acf6-8f89b9b961b6", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6817ec57-4107-4869-8ff8-a38f9e717606", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d1557ab7-2985-47d5-acf6-8f89b9b961b6", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "vulnerability", "id": "vulnerability--abe24fae-d686-4031-a789-b152e32110c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-4428", "description": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4428", "source_name": "cve", "external_id": "CVE-2025-4428"}]}, {"type": "relationship", "id": "relationship--ce91aff5-0375-4ad5-954b-33c0b03c032e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--abe24fae-d686-4031-a789-b152e32110c4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--04ebebee-9dd6-4eee-92cf-b23f65bce368", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--abe24fae-d686-4031-a789-b152e32110c4", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--4e5c8956-cdd9-4f22-8aeb-a3231aeb29ae", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--abe24fae-d686-4031-a789-b152e32110c4", "target_ref": "attack-pattern--106c0cf6-bf73-4601-9aa8-0945c2715ec5"}, {"type": "vulnerability", "id": "vulnerability--9848d223-1b8e-4b43-b5a5-778e4dd1d916", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-5631", "description": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5631", "source_name": "cve", "external_id": "CVE-2023-5631"}]}, {"type": "relationship", "id": "relationship--d927034b-2f65-4134-8fc5-410dc5a93370", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9848d223-1b8e-4b43-b5a5-778e4dd1d916", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--907e7818-0fc8-407d-b31e-339c42b4c104", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9848d223-1b8e-4b43-b5a5-778e4dd1d916", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--914c00d5-6dd0-4842-9b68-bafec58b57e3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9848d223-1b8e-4b43-b5a5-778e4dd1d916", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--1d87d3b0-2573-46ff-9dbc-d69245cf8a64", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-43770", "description": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43770", "source_name": "cve", "external_id": "CVE-2023-43770"}]}, {"type": "relationship", "id": "relationship--18e5152e-4e41-44d0-af8d-61935f5c8539", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--1d87d3b0-2573-46ff-9dbc-d69245cf8a64", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--9b8745e7-1d2e-4f9a-af28-aa0aac991428", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--1d87d3b0-2573-46ff-9dbc-d69245cf8a64", "target_ref": "attack-pattern--354a7f88-63fb-41b5-a801-ce3b377b36f1"}, {"type": "relationship", "id": "relationship--b4f504f0-9de3-4d27-844e-2e87618815a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--1d87d3b0-2573-46ff-9dbc-d69245cf8a64", "target_ref": "attack-pattern--d742a578-d70e-4d0e-96a6-02a9c30204e6"}, {"type": "vulnerability", "id": "vulnerability--74fe2dd6-ba7d-47a1-9c40-66c9a164f72d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-39197", "description": "Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39197", "source_name": "cve", "external_id": "CVE-2022-39197"}]}, {"type": "relationship", "id": "relationship--7f445c0e-2a04-4145-8300-a44237cc70ca", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--74fe2dd6-ba7d-47a1-9c40-66c9a164f72d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--acec6eb6-9435-4ee3-ac9b-d71f8cacd914", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--74fe2dd6-ba7d-47a1-9c40-66c9a164f72d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--2501321a-50f7-49cf-9544-130e60462234", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-24682", "description": "Zimbra Webmail Cross-Site Scripting Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24682", "source_name": "cve", "external_id": "CVE-2022-24682"}]}, {"type": "relationship", "id": "relationship--dba43ee1-30c4-4a80-b4d9-9374ea5fca47", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2501321a-50f7-49cf-9544-130e60462234", "target_ref": "attack-pattern--544b0346-29ad-41e1-a808-501bb4193f47"}, {"type": "relationship", "id": "relationship--58fdcff1-af86-4066-a4a4-e78d1b63f34d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2501321a-50f7-49cf-9544-130e60462234", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "relationship", "id": "relationship--8e006e6a-1f60-4fcf-a9b8-f31678cb4306", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2501321a-50f7-49cf-9544-130e60462234", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--e1f98be8-5436-43d6-ae16-6c3983c63f63", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-3580", "description": "Cisco ASA and FTD Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3580", "source_name": "cve", "external_id": "CVE-2020-3580"}]}, {"type": "relationship", "id": "relationship--2475110b-3073-4be3-a588-5191afe2af80", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e1f98be8-5436-43d6-ae16-6c3983c63f63", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--fa103ded-a0ca-4282-b5f7-c30b0e387364", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e1f98be8-5436-43d6-ae16-6c3983c63f63", "target_ref": "attack-pattern--5e4a2073-9643-44cb-a0b5-e7f4048446c7"}, {"type": "relationship", "id": "relationship--ca4baa52-3b7b-4be0-967f-389178eae9e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e1f98be8-5436-43d6-ae16-6c3983c63f63", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--6e904196-0826-4ac8-9236-8b0b1c804da5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2012-0767", "description": "Adobe Flash Player Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0767", "source_name": "cve", "external_id": "CVE-2012-0767"}]}, {"type": "relationship", "id": "relationship--9b6b9772-8b98-42f4-b740-cc5cec014edd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6e904196-0826-4ac8-9236-8b0b1c804da5", "target_ref": "attack-pattern--b4694861-542c-48ea-9eb1-10d356e7140a"}, {"type": "relationship", "id": "relationship--5eaf8b79-8a6a-4a9d-a6b5-cde67e9f5cff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--6e904196-0826-4ac8-9236-8b0b1c804da5", "target_ref": "attack-pattern--a10641f4-87b4-45a3-a906-92a149cb2c27"}, {"type": "relationship", "id": "relationship--5e1c6b3f-b647-4569-bee0-a81a68629225", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--6e904196-0826-4ac8-9236-8b0b1c804da5", "target_ref": "attack-pattern--544b0346-29ad-41e1-a808-501bb4193f47"}, {"type": "relationship", "id": "relationship--314e0527-d379-4d60-ab63-9cc496ec70ef", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--6e904196-0826-4ac8-9236-8b0b1c804da5", "target_ref": "attack-pattern--ef67e13e-5598-4adc-bdb2-998225874fa9"}, {"type": "vulnerability", "id": "vulnerability--4b5e05d7-0b3b-4aee-a8ab-ff884ea36e5c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-42009", "description": "RoundCube Webmail Cross-Site Scripting Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-42009", "source_name": "cve", "external_id": "CVE-2024-42009"}]}, {"type": "relationship", "id": "relationship--b083c9c3-6b8f-4ea0-b46b-adf19ca216cd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4b5e05d7-0b3b-4aee-a8ab-ff884ea36e5c", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "relationship", "id": "relationship--25b0a0e8-fc5f-481b-8943-270750cb5697", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b5e05d7-0b3b-4aee-a8ab-ff884ea36e5c", "target_ref": "attack-pattern--1608f3e1-598a-42f4-a01a-2e252e81728f"}, {"type": "relationship", "id": "relationship--b6acfa08-9546-43c0-9b71-a7a3e56a2a3d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4b5e05d7-0b3b-4aee-a8ab-ff884ea36e5c", "target_ref": "attack-pattern--bb5a00de-e086-4859-a231-fa793f6797e2"}, {"type": "vulnerability", "id": "vulnerability--4e58be25-19f4-4155-b1ca-60930dc2d235", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-27443", "description": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27443", "source_name": "cve", "external_id": "CVE-2024-27443"}]}, {"type": "relationship", "id": "relationship--e0ad0590-6c67-4fc3-b167-588b95f26f11", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4e58be25-19f4-4155-b1ca-60930dc2d235", "target_ref": "attack-pattern--2b742742-28c3-4e1b-bab7-8350d6300fa7"}, {"type": "relationship", "id": "relationship--7532abe6-ca4f-43c3-8da0-fcc73bf67c29", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4e58be25-19f4-4155-b1ca-60930dc2d235", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "relationship", "id": "relationship--f2674f84-05ca-4727-9068-d787cefe4ad0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4e58be25-19f4-4155-b1ca-60930dc2d235", "target_ref": "attack-pattern--1608f3e1-598a-42f4-a01a-2e252e81728f"}, {"type": "relationship", "id": "relationship--8ec77af1-c33e-4788-aa4c-ff426a108c1d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--4e58be25-19f4-4155-b1ca-60930dc2d235", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "vulnerability", "id": "vulnerability--770a9230-64d8-4510-bdea-d84c1671ff60", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-11182", "description": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11182", "source_name": "cve", "external_id": "CVE-2024-11182"}]}, {"type": "relationship", "id": "relationship--679ef4da-1026-48ed-8fa4-5901d930eb33", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--770a9230-64d8-4510-bdea-d84c1671ff60", "target_ref": "attack-pattern--a62a8db3-f23a-4d8f-afd6-9dbc77e7813b"}, {"type": "relationship", "id": "relationship--a3272f15-d055-4782-9359-a0293a1e5509", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--770a9230-64d8-4510-bdea-d84c1671ff60", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--052ee041-f21c-47d7-9f96-7d1ad1374806", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--770a9230-64d8-4510-bdea-d84c1671ff60", "target_ref": "attack-pattern--40597f16-0963-4249-bf4c-ac93b7fb9807"}, {"type": "vulnerability", "id": "vulnerability--e8c80708-004e-4922-8635-385dc2447ba0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-34192", "description": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34192", "source_name": "cve", "external_id": "CVE-2023-34192"}]}, {"type": "relationship", "id": "relationship--7cf07ff9-5063-4c4b-9ee9-5f6f807e105a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e8c80708-004e-4922-8635-385dc2447ba0", "target_ref": "attack-pattern--43e7dc91-05b2-474c-b9ac-2ed4fe101f4d"}, {"type": "relationship", "id": "relationship--fa480824-8afc-4adc-b9ba-5bc0d2cdb99e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e8c80708-004e-4922-8635-385dc2447ba0", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--d4d8814d-6efa-440d-9a31-ff928326debb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e8c80708-004e-4922-8635-385dc2447ba0", "target_ref": "attack-pattern--544b0346-29ad-41e1-a808-501bb4193f47"}, {"type": "vulnerability", "id": "vulnerability--c795d5d9-1945-47d1-b9b2-76b0cdf8f9a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-46604", "description": "Apache ActiveMQ Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46604", "source_name": "cve", "external_id": "CVE-2023-46604"}]}, {"type": "relationship", "id": "relationship--ec41475c-f4a7-4a55-8953-bed8429f6d07", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--c795d5d9-1945-47d1-b9b2-76b0cdf8f9a5", "target_ref": "attack-pattern--005a06c6-14bf-4118-afa0-ebcd8aebb0c9"}, {"type": "relationship", "id": "relationship--7a35bbcd-ea85-4f01-9692-ee91bd1c0cde", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--c795d5d9-1945-47d1-b9b2-76b0cdf8f9a5", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--71e1d244-d3c4-4e0a-8341-a9d330c5e8d0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--c795d5d9-1945-47d1-b9b2-76b0cdf8f9a5", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--0f803193-16f5-4dbd-9848-6b35d864e446", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-40044", "description": "Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40044", "source_name": "cve", "external_id": "CVE-2023-40044"}]}, {"type": "relationship", "id": "relationship--9d008036-c5c8-4b25-9c12-0ba403c61386", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--0f803193-16f5-4dbd-9848-6b35d864e446", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--79248937-f54e-4d9e-a9e7-77c4266a1a0a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0f803193-16f5-4dbd-9848-6b35d864e446", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--e2234d94-4abf-4552-8927-38871d15ee38", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0f803193-16f5-4dbd-9848-6b35d864e446", "target_ref": "attack-pattern--9a60a291-8960-4387-8a4a-2ab5c18bb50b"}, {"type": "vulnerability", "id": "vulnerability--f27f4cf7-a892-4e2b-a064-8b070de2b0c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-38203", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38203", "source_name": "cve", "external_id": "CVE-2023-38203"}]}, {"type": "relationship", "id": "relationship--e0b6a160-fcad-4971-8292-85ed6a2331fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f27f4cf7-a892-4e2b-a064-8b070de2b0c4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ecb74e3b-ac96-4e3d-a0ed-b3eec6aac467", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f27f4cf7-a892-4e2b-a064-8b070de2b0c4", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--2a7ef26e-a498-4012-a547-4c06cf8e7538", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-29492", "description": "Novi Survey Insecure Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29492", "source_name": "cve", "external_id": "CVE-2023-29492"}]}, {"type": "relationship", "id": "relationship--7c1fc2e3-cee6-42df-a379-caba8d21486a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2a7ef26e-a498-4012-a547-4c06cf8e7538", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--31dedbfb-8a01-41c3-bd43-1b2291c5d538", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-29300", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29300", "source_name": "cve", "external_id": "CVE-2023-29300"}]}, {"type": "relationship", "id": "relationship--62fd9769-121b-4ea3-b3fe-a93523deabec", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--31dedbfb-8a01-41c3-bd43-1b2291c5d538", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--23b0a744-65d5-492d-9e5f-6967e00fce53", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--31dedbfb-8a01-41c3-bd43-1b2291c5d538", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-26360", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26360", "source_name": "cve", "external_id": "CVE-2023-26360"}]}, {"type": "relationship", "id": "relationship--164bfb58-dd6d-471a-bad9-137ee176b296", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--e7aaf3b8-50a8-4418-a447-c28378ecadd2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--df8b2a25-8bdf-4856-953c-a04372b1c161"}, {"type": "relationship", "id": "relationship--77421db3-a441-4c37-840a-2479847638e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "relationship", "id": "relationship--589eb89d-e76a-4ea1-9eb8-c114150a37a8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--e3a12395-188d-4051-9a16-ea8e14d07b88"}, {"type": "relationship", "id": "relationship--75657f93-9d96-4bc4-8df9-6a3e41fe28a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--65f2d882-3f41-4d48-8a06-29af77ec9f90"}, {"type": "relationship", "id": "relationship--93c065c2-cafc-45f0-b138-6431a905e56e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--1c4e5d32-1fe9-4116-9d9d-59e3925bd6a2"}, {"type": "relationship", "id": "relationship--8ab5adb4-9aba-4429-b047-4698671b0cbf", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--5d2be8b9-d24c-4e98-83bf-2f5f79477163"}, {"type": "relationship", "id": "relationship--ebe2ede5-4388-4cd7-a89c-df1d724f1e5c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--88271568-332a-4a46-94c4-1f2f70408f20", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ad025f97-dc04-468f-a23e-0a731a41ce87", "target_ref": "attack-pattern--0f4a0c76-ab2d-4cb0-85d3-3f0efb8cba0d"}, {"type": "vulnerability", "id": "vulnerability--036123c6-bedb-4c45-ae16-766d93fe2f9b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-26359", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26359", "source_name": "cve", "external_id": "CVE-2023-26359"}]}, {"type": "relationship", "id": "relationship--34ae252b-288f-476e-a66a-246dcb866695", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--036123c6-bedb-4c45-ae16-766d93fe2f9b", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--330df8d6-4e1e-49ca-afeb-90130d1a2dd4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--036123c6-bedb-4c45-ae16-766d93fe2f9b", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--3dad6392-8b64-45bb-876d-9126a091d4fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-45046", "description": "Apache Log4j2 Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45046", "source_name": "cve", "external_id": "CVE-2021-45046"}]}, {"type": "relationship", "id": "relationship--6dc0d281-8907-4d7c-9d22-d1512520d6c7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--3dad6392-8b64-45bb-876d-9126a091d4fd", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--88ab60fe-6e34-4be6-9a98-8166ca2963a6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--3dad6392-8b64-45bb-876d-9126a091d4fd", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "vulnerability", "id": "vulnerability--e017bb6a-226c-41a2-9811-dd7ba4e1255c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-18935", "description": "Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18935", "source_name": "cve", "external_id": "CVE-2019-18935"}]}, {"type": "relationship", "id": "relationship--3fa22d91-74d9-4bcf-b350-feed1c7e375e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e017bb6a-226c-41a2-9811-dd7ba4e1255c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6b4533c3-1d9a-4bab-aca9-5da86cc1e4cb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e017bb6a-226c-41a2-9811-dd7ba4e1255c", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--aab8f955-0f11-4136-af33-cd87da9fbe83", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e017bb6a-226c-41a2-9811-dd7ba4e1255c", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "relationship", "id": "relationship--f76382d4-86d5-4c58-8aae-4176b1960abd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e017bb6a-226c-41a2-9811-dd7ba4e1255c", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--0dff8b57-4a75-4394-887e-5b76bc57b0c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-4939", "description": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4939", "source_name": "cve", "external_id": "CVE-2018-4939"}]}, {"type": "relationship", "id": "relationship--70c14ea6-1f09-4c27-9a32-d9262f661c8c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0dff8b57-4a75-4394-887e-5b76bc57b0c4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--ff06fdb5-315f-40a3-9a90-e849d17d0aa7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--0dff8b57-4a75-4394-887e-5b76bc57b0c4", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--3df4d1eb-6dbc-44bd-bb83-3f95986529e1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--0dff8b57-4a75-4394-887e-5b76bc57b0c4", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--899308e3-082f-4cf3-a76a-f8f779fd2c2c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-9805", "description": "Apache Struts Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9805", "source_name": "cve", "external_id": "CVE-2017-9805"}]}, {"type": "relationship", "id": "relationship--6a972bf7-8745-445e-9618-e1d294ad7615", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--899308e3-082f-4cf3-a76a-f8f779fd2c2c", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--fd974cef-43ed-48c6-99fa-aa515a902951", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--899308e3-082f-4cf3-a76a-f8f779fd2c2c", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9d42f589-1226-4e80-9c74-7201e050316d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-23006", "description": "SonicWall SMA1000 Appliances Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23006", "source_name": "cve", "external_id": "CVE-2025-23006"}]}, {"type": "relationship", "id": "relationship--8a1ee1af-2791-46e3-a7f5-29d405ec222a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9d42f589-1226-4e80-9c74-7201e050316d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d35c7fe3-6071-4514-844a-f1045290ebe9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9d42f589-1226-4e80-9c74-7201e050316d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--d9c50240-e5ac-4b8e-9b9e-536ebb7b5f8d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-0994", "description": "Trimble Cityworks Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0994", "source_name": "cve", "external_id": "CVE-2025-0994"}]}, {"type": "relationship", "id": "relationship--e52d8986-24c7-4ed7-aeef-6d4bb22753d9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d9c50240-e5ac-4b8e-9b9e-536ebb7b5f8d", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--8c59a743-ed09-4c01-bf15-9be7caeb3579", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d9c50240-e5ac-4b8e-9b9e-536ebb7b5f8d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--695f6131-8a94-406f-bac9-22063a046688", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-20953", "description": "Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20953", "source_name": "cve", "external_id": "CVE-2024-20953"}]}, {"type": "relationship", "id": "relationship--7fb85b76-77f8-4b49-a89c-9de88cb480d6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--695f6131-8a94-406f-bac9-22063a046688", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--7fa511a0-20db-4511-a9d7-07fbd6748dbe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--695f6131-8a94-406f-bac9-22063a046688", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--9dd7a183-2337-4515-ae7e-830646b821cc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-24016", "description": "Wazuh Server Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24016", "source_name": "cve", "external_id": "CVE-2025-24016"}]}, {"type": "relationship", "id": "relationship--a8a46e58-5fb4-4462-b68f-d4493e97b79c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9dd7a183-2337-4515-ae7e-830646b821cc", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--d7d80029-e220-43db-bbbf-f49dffa7e101", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9dd7a183-2337-4515-ae7e-830646b821cc", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}, {"type": "relationship", "id": "relationship--f877c921-7506-44b6-a7f6-5bc98a2d31c0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9dd7a183-2337-4515-ae7e-830646b821cc", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--efe46e5f-fcee-4644-8dc5-fcbaddb30706", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-53770", "description": "Microsoft SharePoint Deserialization of Untrusted Data Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53770", "source_name": "cve", "external_id": "CVE-2025-53770"}]}, {"type": "relationship", "id": "relationship--a2571230-ad8c-4afc-a606-a4923fd9cbe2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--efe46e5f-fcee-4644-8dc5-fcbaddb30706", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--759a348b-810b-4329-a638-b97650febe12", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--efe46e5f-fcee-4644-8dc5-fcbaddb30706", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--ca089ce1-fa18-4920-9d77-5f83a14f43eb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-42999", "description": "SAP NetWeaver Deserialization Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-42999", "source_name": "cve", "external_id": "CVE-2025-42999"}]}, {"type": "relationship", "id": "relationship--7dc6fc35-203a-41e3-8a77-ab23edd5ebfb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca089ce1-fa18-4920-9d77-5f83a14f43eb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--8d86d94c-2238-4134-a99c-16d488d93995", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ca089ce1-fa18-4920-9d77-5f83a14f43eb", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--1d2726ee-674f-415b-b073-948e9d9594a5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ca089ce1-fa18-4920-9d77-5f83a14f43eb", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--205ddda0-616c-444a-bf25-2d61d7e4ba7c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ca089ce1-fa18-4920-9d77-5f83a14f43eb", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--798e9885-9d19-4428-9d85-d6182a8faa0f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36851", "description": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36851", "source_name": "cve", "external_id": "CVE-2023-36851"}]}, {"type": "relationship", "id": "relationship--b22705a2-2790-48b3-b31f-cd5af4a59dd6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--798e9885-9d19-4428-9d85-d6182a8faa0f", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--f46e8ef1-7c09-468a-acab-2b4382ad1cce", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--798e9885-9d19-4428-9d85-d6182a8faa0f", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--a3e96b67-001e-48cb-b0aa-cbca003decc8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36847", "description": "Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36847", "source_name": "cve", "external_id": "CVE-2023-36847"}]}, {"type": "relationship", "id": "relationship--bb0e392a-d1bb-4975-a6c3-ca81e2aac43b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a3e96b67-001e-48cb-b0aa-cbca003decc8", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--28d83a06-5a4c-4e2a-931c-610f2f31968e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a3e96b67-001e-48cb-b0aa-cbca003decc8", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--cbf8a519-58d5-4307-b04c-d0e78b3cc689", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-36846", "description": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36846", "source_name": "cve", "external_id": "CVE-2023-36846"}]}, {"type": "relationship", "id": "relationship--73dca547-b02f-4ba3-bc90-3cad6a9673d1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cbf8a519-58d5-4307-b04c-d0e78b3cc689", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--6a2c85d2-b198-430d-b425-f0b67c1a3a28", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cbf8a519-58d5-4307-b04c-d0e78b3cc689", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-27532", "description": "Veeam Backup & Replication Cloud Connect Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27532", "source_name": "cve", "external_id": "CVE-2023-27532"}]}, {"type": "relationship", "id": "relationship--c7235468-fbd6-4f84-814c-11a65f2b79ae", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--b80d107d-fa0d-4b60-9684-b0433e8bdba0"}, {"type": "relationship", "id": "relationship--a7d7608e-82f2-4918-94a4-bb936562e47a", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "relationship", "id": "relationship--8368bd70-7818-474f-ad6d-aa3bb69ac34f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "relationship", "id": "relationship--e4956f48-07b3-4559-b9e4-c96d03ee47e4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--25659dd6-ea12-45c4-97e6-381e3e4b593e"}, {"type": "relationship", "id": "relationship--186354f2-6931-4550-913b-8820ed9ba7bc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--d1fcf083-a721-4223-aedf-bf8960798d62"}, {"type": "relationship", "id": "relationship--5fb6c3d4-fd9d-4482-ae2c-8cfbdc674974", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--735acef1-6427-4a64-a832-cc0c65cae772", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--2e2e4e41-ec5e-483e-a77f-ccbf735585d5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-1388", "description": "F5 BIG-IP Missing Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1388", "source_name": "cve", "external_id": "CVE-2022-1388"}]}, {"type": "relationship", "id": "relationship--c12f8c05-4173-4b0c-9664-c3ebf6dcb185", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2e2e4e41-ec5e-483e-a77f-ccbf735585d5", "target_ref": "attack-pattern--67720091-eee3-4d2d-ae16-8264567f6f5b"}, {"type": "vulnerability", "id": "vulnerability--410b6977-0c34-4655-93f9-4800795dcf39", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-3248", "description": "Langflow Missing Authentication Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3248", "source_name": "cve", "external_id": "CVE-2025-3248"}]}, {"type": "relationship", "id": "relationship--be75f766-a1df-429c-9567-fc1e76b736f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--410b6977-0c34-4655-93f9-4800795dcf39", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--28ef2fb2-1a0d-48ad-bb2e-982d964db429", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--410b6977-0c34-4655-93f9-4800795dcf39", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--2dc3ddc7-88ea-48d5-9b7b-0b2176894afd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-32433", "description": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32433", "source_name": "cve", "external_id": "CVE-2025-32433"}]}, {"type": "relationship", "id": "relationship--13f16579-7d4e-4698-86ee-517894c2f041", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--2dc3ddc7-88ea-48d5-9b7b-0b2176894afd", "target_ref": "attack-pattern--2db31dcd-54da-405d-acef-b9129b816ed6"}, {"type": "relationship", "id": "relationship--292124f9-17c4-401b-83e3-8f0d0976efbd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2dc3ddc7-88ea-48d5-9b7b-0b2176894afd", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--08d26b0f-afd1-45f5-9581-405d06f95b18", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-35081", "description": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35081", "source_name": "cve", "external_id": "CVE-2023-35081"}]}, {"type": "relationship", "id": "relationship--52ea3bd9-7a2a-4e4d-b5ec-243e87da01a1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--08d26b0f-afd1-45f5-9581-405d06f95b18", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--861280a4-7705-4066-9aba-67e0102cd310", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--08d26b0f-afd1-45f5-9581-405d06f95b18", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--e2f743ac-ead6-40b8-a10d-4b369bfe6b60", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-32315", "description": "Ignite Realtime Openfire Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32315", "source_name": "cve", "external_id": "CVE-2023-32315"}]}, {"type": "relationship", "id": "relationship--ea6d4f75-0c3a-40ff-acf4-dda245bb255b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e2f743ac-ead6-40b8-a10d-4b369bfe6b60", "target_ref": "attack-pattern--21875073-b0ee-49e3-9077-1e2a885359af"}, {"type": "relationship", "id": "relationship--e2b82be3-5071-47d5-8b56-b04da92b7a10", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--e2f743ac-ead6-40b8-a10d-4b369bfe6b60", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--113aff1c-eb00-4e28-be67-67c50c069cc3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--e2f743ac-ead6-40b8-a10d-4b369bfe6b60", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--467b15ef-7a43-4cdd-b1ea-099ab3f5c443", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--e2f743ac-ead6-40b8-a10d-4b369bfe6b60", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "vulnerability", "id": "vulnerability--21bb6632-a5a6-452a-8afe-305cfa000829", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-41328", "description": "Fortinet FortiOS Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41328", "source_name": "cve", "external_id": "CVE-2022-41328"}]}, {"type": "relationship", "id": "relationship--41a95ca6-bf77-487c-a78a-94f96f32b1ae", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--21bb6632-a5a6-452a-8afe-305cfa000829", "target_ref": "attack-pattern--7e150503-88e7-4861-866b-ff1ac82c4475"}, {"type": "relationship", "id": "relationship--1a752696-5a5a-4f3c-834c-55c0697a71fd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--21bb6632-a5a6-452a-8afe-305cfa000829", "target_ref": "attack-pattern--1cfcb312-b8d7-47a4-b560-4b16cc677292"}, {"type": "relationship", "id": "relationship--288ebcea-92e8-45dc-8a1d-22c744e0bba4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--21bb6632-a5a6-452a-8afe-305cfa000829", "target_ref": "attack-pattern--03259939-0b57-482f-8eb5-87c0e0d54334"}, {"type": "relationship", "id": "relationship--2ee6dff8-9f32-4a0e-94c5-fad196d99ab1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--21bb6632-a5a6-452a-8afe-305cfa000829", "target_ref": "attack-pattern--aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6"}, {"type": "vulnerability", "id": "vulnerability--269899cb-b289-4bc7-a58a-d7ed6cdf6ec1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-42013", "description": "Apache HTTP Server Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42013", "source_name": "cve", "external_id": "CVE-2021-42013"}]}, {"type": "relationship", "id": "relationship--2cf573de-fdc9-4101-aab5-50754ad304fe", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--269899cb-b289-4bc7-a58a-d7ed6cdf6ec1", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--0c845925-4a0a-4c52-a463-ad94eeed4729", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--269899cb-b289-4bc7-a58a-d7ed6cdf6ec1", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "vulnerability", "id": "vulnerability--28e8dbbf-b234-454f-9c11-ddb16098b702", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-41773", "description": "Apache HTTP Server Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41773", "source_name": "cve", "external_id": "CVE-2021-41773"}]}, {"type": "relationship", "id": "relationship--6e174530-1502-4cd3-9a06-03d0d26bc729", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--28e8dbbf-b234-454f-9c11-ddb16098b702", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--3ffdf3c5-4286-485a-8e88-71183885980b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--28e8dbbf-b234-454f-9c11-ddb16098b702", "target_ref": "attack-pattern--9db0cf3a-a3c9-4012-8268-123b9db6fd82"}, {"type": "vulnerability", "id": "vulnerability--f9b8da5c-6c0d-4609-a0a9-baf345a4dec1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-3452", "description": "Cisco ASA and FTD Read-Only Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3452", "source_name": "cve", "external_id": "CVE-2020-3452"}]}, {"type": "relationship", "id": "relationship--508765af-825f-413b-9b64-456e392aa5dd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--f9b8da5c-6c0d-4609-a0a9-baf345a4dec1", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--883ea6bd-db67-445e-9722-46e4a0ea003d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--f9b8da5c-6c0d-4609-a0a9-baf345a4dec1", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--577396d8-9792-43a3-890a-a2c0a74a992d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-3398", "description": "Atlassian Confluence Server and Data Center Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3398", "source_name": "cve", "external_id": "CVE-2019-3398"}]}, {"type": "relationship", "id": "relationship--cb55f545-922c-4740-93c8-3d01aa1cec1e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--577396d8-9792-43a3-890a-a2c0a74a992d", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--cb55fe56-c506-47c1-93c2-f50e8f74bf99", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--577396d8-9792-43a3-890a-a2c0a74a992d", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--bbb6823c-9ca5-4ffe-b213-97d75331f7c9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2018-13379", "description": "Fortinet FortiOS SSL VPN Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-13379", "source_name": "cve", "external_id": "CVE-2018-13379"}]}, {"type": "relationship", "id": "relationship--9d6a91a7-b187-4279-889e-b43e0412c789", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--bbb6823c-9ca5-4ffe-b213-97d75331f7c9", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "vulnerability", "id": "vulnerability--ad87b7fc-2a4d-47be-87fd-33a6e4f9e4e0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2013-0629", "description": "Adobe ColdFusion Directory Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0629", "source_name": "cve", "external_id": "CVE-2013-0629"}]}, {"type": "relationship", "id": "relationship--3b0eb37a-9e0d-423d-ae49-9c2ab1b07210", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ad87b7fc-2a4d-47be-87fd-33a6e4f9e4e0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--9b01803b-271b-4903-aa3a-0236b247ee00", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ad87b7fc-2a4d-47be-87fd-33a6e4f9e4e0", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--9c8b84ea-3b2b-4b59-a612-4c2bc8dd7498", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ad87b7fc-2a4d-47be-87fd-33a6e4f9e4e0", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--322d3183-e313-4a6b-8c30-cc271d2393c2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2010-2861", "description": "Adobe ColdFusion Directory Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2861", "source_name": "cve", "external_id": "CVE-2010-2861"}]}, {"type": "relationship", "id": "relationship--c7c419b9-bde9-404e-9c3f-a339693bdfff", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--322d3183-e313-4a6b-8c30-cc271d2393c2", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--dd97cf24-222a-4bbf-8364-0c214c05cb3f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--322d3183-e313-4a6b-8c30-cc271d2393c2", "target_ref": "attack-pattern--30208d3e-0d6b-43c8-883e-44462a514619"}, {"type": "relationship", "id": "relationship--e4f9198d-d26e-4c8d-a5e5-2f77c16ab6b7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--322d3183-e313-4a6b-8c30-cc271d2393c2", "target_ref": "attack-pattern--e6919abc-99f9-4c6c-95a5-14761e7b2add"}, {"type": "vulnerability", "id": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-57727", "description": "SimpleHelp Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57727", "source_name": "cve", "external_id": "CVE-2024-57727"}]}, {"type": "relationship", "id": "relationship--9ca4b90b-0285-4774-aa1d-05d02e12a366", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--bb1e0897-1d1f-4846-9e5d-afb0c4636f2b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "target_ref": "attack-pattern--837f9164-50af-4ac0-8219-379d8a74cefc"}, {"type": "relationship", "id": "relationship--f9dac4fe-8839-4856-aa2b-175f02844b95", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "target_ref": "attack-pattern--60b508a1-6a5e-46b1-821a-9f7b78752abf"}, {"type": "relationship", "id": "relationship--34d6c30d-5b56-4ffb-8677-4024bfdec4d6", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "relationship", "id": "relationship--49764dd4-7e3c-4d81-8847-1fe91262d504", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--d5d35eac-e1a5-499b-b1c5-af9cf752af95", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--8e8b2813-49ad-4805-9d7a-522ef91e7c0d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-55550", "description": "Mitel MiCollab Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55550", "source_name": "cve", "external_id": "CVE-2024-55550"}]}, {"type": "relationship", "id": "relationship--aa229fcc-39b4-473d-94dc-bde5b2bfd3f5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8e8b2813-49ad-4805-9d7a-522ef91e7c0d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--05172495-e949-4c8d-80e8-cc6999ce54af", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8e8b2813-49ad-4805-9d7a-522ef91e7c0d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--1f8aca97-2b22-4d53-81a4-5967387e4c28", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8e8b2813-49ad-4805-9d7a-522ef91e7c0d", "target_ref": "attack-pattern--92d7da27-2d91-488e-a00c-059dc162766d"}, {"type": "vulnerability", "id": "vulnerability--543cfa85-d5be-48fb-bef2-c64528f88663", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-4885", "description": "Progress WhatsUp Gold Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4885", "source_name": "cve", "external_id": "CVE-2024-4885"}]}, {"type": "relationship", "id": "relationship--6342bb2e-805b-4eec-a44b-a94c624f1664", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--543cfa85-d5be-48fb-bef2-c64528f88663", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--666d70a4-38bc-4df1-8f01-219d7107e569", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--543cfa85-d5be-48fb-bef2-c64528f88663", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--7aead94a-450e-4c32-a2b6-54abd3bbdfb4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-48248", "description": "NAKIVO Backup and Replication Absolute Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-48248", "source_name": "cve", "external_id": "CVE-2024-48248"}]}, {"type": "relationship", "id": "relationship--57f699fe-a01d-437b-ae71-583073417ab7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--7aead94a-450e-4c32-a2b6-54abd3bbdfb4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--07700a48-21b0-48a4-822b-ae926790f2d2", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--7aead94a-450e-4c32-a2b6-54abd3bbdfb4", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "relationship", "id": "relationship--30c53f39-cd8e-4dd6-94ba-3c3eb173f331", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--7aead94a-450e-4c32-a2b6-54abd3bbdfb4", "target_ref": "attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22"}, {"type": "vulnerability", "id": "vulnerability--80976a20-2966-4413-835d-b454120ce34f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-41713", "description": "Mitel MiCollab Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41713", "source_name": "cve", "external_id": "CVE-2024-41713"}]}, {"type": "relationship", "id": "relationship--a7cc6c99-e2fe-44c6-bcca-9bfc2a20e9c4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--80976a20-2966-4413-835d-b454120ce34f", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--ca6fdfd2-98fe-4382-a458-b45f9860a390", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--80976a20-2966-4413-835d-b454120ce34f", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--9d02551e-9cfd-40ed-92d0-26df5543f7ea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-13161", "description": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13161", "source_name": "cve", "external_id": "CVE-2024-13161"}]}, {"type": "relationship", "id": "relationship--47df1535-4073-42a9-b117-1cd69a0c2847", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9d02551e-9cfd-40ed-92d0-26df5543f7ea", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--d06204c9-d18a-488f-bcf4-e037d8e772f9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--9d02551e-9cfd-40ed-92d0-26df5543f7ea", "target_ref": "attack-pattern--3fc01293-ef5e-41c6-86ce-61f10706b64a"}, {"type": "relationship", "id": "relationship--ecb148d0-0ce0-47a3-a5eb-e773867b44ae", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--9d02551e-9cfd-40ed-92d0-26df5543f7ea", "target_ref": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e"}, {"type": "relationship", "id": "relationship--587855de-7393-469b-8273-6bab154c4a34", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--9d02551e-9cfd-40ed-92d0-26df5543f7ea", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "vulnerability", "id": "vulnerability--693aeced-1e18-4913-8b7b-a81a8513ccbb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-13160", "description": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13160", "source_name": "cve", "external_id": "CVE-2024-13160"}]}, {"type": "relationship", "id": "relationship--6326a6e9-9bbe-4663-a2aa-87334c54ce46", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--693aeced-1e18-4913-8b7b-a81a8513ccbb", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--9e8e750b-f0e4-4ced-bf4a-44b8af3db4e9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--693aeced-1e18-4913-8b7b-a81a8513ccbb", "target_ref": "attack-pattern--3fc01293-ef5e-41c6-86ce-61f10706b64a"}, {"type": "relationship", "id": "relationship--f7b53853-35a5-4030-97ea-cb73b83b658d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--693aeced-1e18-4913-8b7b-a81a8513ccbb", "target_ref": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e"}, {"type": "relationship", "id": "relationship--c56e5cfe-73e2-4418-9c54-3f4bfc1041c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--693aeced-1e18-4913-8b7b-a81a8513ccbb", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "vulnerability", "id": "vulnerability--27faaa1b-b5de-407c-ba16-c767d21639f0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-13159", "description": "Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13159", "source_name": "cve", "external_id": "CVE-2024-13159"}]}, {"type": "relationship", "id": "relationship--2711c345-db9e-49d2-a638-11c0d53f017b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27faaa1b-b5de-407c-ba16-c767d21639f0", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--0a89f996-ff06-4781-bcaf-f050a2dadb68", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--27faaa1b-b5de-407c-ba16-c767d21639f0", "target_ref": "attack-pattern--3fc01293-ef5e-41c6-86ce-61f10706b64a"}, {"type": "relationship", "id": "relationship--3e48f11d-a4e6-4223-a9b5-8c011b86732c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--27faaa1b-b5de-407c-ba16-c767d21639f0", "target_ref": "attack-pattern--e624264c-033a-424d-9fd7-fc9c3bbdb03e"}, {"type": "relationship", "id": "relationship--e8f6b0a9-1aa4-44fb-81a8-ea643b1b92a8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--27faaa1b-b5de-407c-ba16-c767d21639f0", "target_ref": "attack-pattern--72b74d71-8169-42aa-92e0-e7b04b9f5a08"}, {"type": "vulnerability", "id": "vulnerability--17197f23-e089-42fa-b908-a9495a36cdea", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-0769", "description": " D-Link DIR-859 Router Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0769", "source_name": "cve", "external_id": "CVE-2024-0769"}]}, {"type": "relationship", "id": "relationship--1409d76b-7c15-49d1-ac73-2a916b525e35", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--17197f23-e089-42fa-b908-a9495a36cdea", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--01275e85-ffbb-4989-9516-6af345fadb0e", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--17197f23-e089-42fa-b908-a9495a36cdea", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--61185bb0-83d4-4b25-9f0a-2285ec65a45d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-38950", "description": "ZKTeco BioTime Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38950", "source_name": "cve", "external_id": "CVE-2023-38950"}]}, {"type": "relationship", "id": "relationship--43744d6b-9a44-4de3-9adc-4dd94971bcf3", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--61185bb0-83d4-4b25-9f0a-2285ec65a45d", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--5e6162b0-a4ff-4fa1-8c7e-f21e78d0f632", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--61185bb0-83d4-4b25-9f0a-2285ec65a45d", "target_ref": "attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5"}, {"type": "vulnerability", "id": "vulnerability--ac571249-5b72-4354-8c01-e209daf909b4", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2017-12637", "description": "SAP NetWeaver Directory Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12637", "source_name": "cve", "external_id": "CVE-2017-12637"}]}, {"type": "relationship", "id": "relationship--74929e2b-f037-498b-9a03-4bb612bec9c8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--ac571249-5b72-4354-8c01-e209daf909b4", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--10db8dd9-ab99-4840-8912-226cb3924911", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--ac571249-5b72-4354-8c01-e209daf909b4", "target_ref": "attack-pattern--7bc57495-ea59-4380-be31-a64af124ef18"}, {"type": "relationship", "id": "relationship--59de9569-bede-4bd7-b6f9-8bef3a6ea871", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac571249-5b72-4354-8c01-e209daf909b4", "target_ref": "attack-pattern--09312b1a-c3c6-4b45-9844-3ccc78e5d82f"}, {"type": "relationship", "id": "relationship--98ed3735-e7d9-4f42-93a6-a9df85cda33d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--ac571249-5b72-4354-8c01-e209daf909b4", "target_ref": "attack-pattern--3fc9b85a-2862-4363-a64d-d692e3ffbee0"}, {"type": "vulnerability", "id": "vulnerability--cd349726-2ac2-4237-b20a-884c31379651", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-4632", "description": "Samsung MagicINFO 9 Server Path Traversal Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4632", "source_name": "cve", "external_id": "CVE-2025-4632"}]}, {"type": "relationship", "id": "relationship--8afb327b-8cad-416e-a519-49864e63fcb7", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--cd349726-2ac2-4237-b20a-884c31379651", "target_ref": "attack-pattern--b21c3b2d-02e6-45b1-980b-e69051040839"}, {"type": "relationship", "id": "relationship--b6926559-f63a-4a58-b937-eebf0bf7db33", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--cd349726-2ac2-4237-b20a-884c31379651", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--1a80306f-fbb3-464c-827d-e4139a25bddb", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cd349726-2ac2-4237-b20a-884c31379651", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--dc8d5b67-f4f4-4a60-b9df-55123875d23c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--cd349726-2ac2-4237-b20a-884c31379651", "target_ref": "attack-pattern--3ee16395-03f0-4690-a32e-69ce9ada0f9e"}, {"type": "vulnerability", "id": "vulnerability--db1deaca-42cf-4e69-82d8-b90b7e81fab5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2023-22527", "description": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22527", "source_name": "cve", "external_id": "CVE-2023-22527"}]}, {"type": "relationship", "id": "relationship--06265294-30d6-4b5c-9a33-53c42572277f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--db1deaca-42cf-4e69-82d8-b90b7e81fab5", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--8ddb165d-80c0-403c-a3db-9e7990154951", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--db1deaca-42cf-4e69-82d8-b90b7e81fab5", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "vulnerability", "id": "vulnerability--dfbc0a37-db39-46dd-9a2e-1951a7c42f41", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-22954", "description": "VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22954", "source_name": "cve", "external_id": "CVE-2022-22954"}]}, {"type": "relationship", "id": "relationship--2e6fd044-605e-4cd5-b7f2-c7ecd62a7025", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--dfbc0a37-db39-46dd-9a2e-1951a7c42f41", "target_ref": "attack-pattern--5d0d3609-d06d-49e1-b9c9-b544e0c618cb"}, {"type": "relationship", "id": "relationship--580b23d6-0a39-4dd4-a366-22ac3f9f74cd", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--dfbc0a37-db39-46dd-9a2e-1951a7c42f41", "target_ref": "attack-pattern--dc31fe1e-d722-49da-8f5f-92c7b5aff534"}, {"type": "vulnerability", "id": "vulnerability--a5dcb7ad-4311-433c-b5b0-51f223c1a7b1", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-36380", "description": "Sunhillo SureLine OS Command Injection Vulnerablity", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36380", "source_name": "cve", "external_id": "CVE-2021-36380"}]}, {"type": "relationship", "id": "relationship--023932df-0bdd-4530-b731-61955b843b70", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--a5dcb7ad-4311-433c-b5b0-51f223c1a7b1", "target_ref": "attack-pattern--3f886f2a-874f-4333-b794-aa6075009b1c"}, {"type": "relationship", "id": "relationship--01b3e0ed-9c2a-4b22-93c7-8538f90ebb5f", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--a5dcb7ad-4311-433c-b5b0-51f223c1a7b1", "target_ref": "attack-pattern--a9d4b653-6915-42af-98b2-5758c4ceee56"}, {"type": "vulnerability", "id": "vulnerability--2874d44f-bbc1-4123-95f4-c6318a5068f0", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2021-26084", "description": "Atlassian Confluence Server and Data Center Object-Graph Navigation Language (OGNL) Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26084", "source_name": "cve", "external_id": "CVE-2021-26084"}]}, {"type": "relationship", "id": "relationship--3f9287b2-eea2-4c8a-b655-b0ca4745af27", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--2874d44f-bbc1-4123-95f4-c6318a5068f0", "target_ref": "attack-pattern--cd25c1b4-935c-4f0e-ba8d-552f28bc4783"}, {"type": "relationship", "id": "relationship--e26980ed-16fb-4204-b911-621181ade79c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--2874d44f-bbc1-4123-95f4-c6318a5068f0", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "vulnerability", "id": "vulnerability--8379b6b7-d568-49e1-a44e-c3d9ea5eb44d", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2019-3396", "description": "Atlassian Confluence Server and Data Center Server-Side Template Injection Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3396", "source_name": "cve", "external_id": "CVE-2019-3396"}]}, {"type": "relationship", "id": "relationship--957fb177-514f-4e41-8414-0f218e2ef8d8", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "secondary-impact", "source_ref": "vulnerability--8379b6b7-d568-49e1-a44e-c3d9ea5eb44d", "target_ref": "attack-pattern--3b0e52ce-517a-4614-a523-1bd5deef6c5e"}, {"type": "relationship", "id": "relationship--e4c1113b-b9c3-4abe-a7c3-8daaa9694882", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--8379b6b7-d568-49e1-a44e-c3d9ea5eb44d", "target_ref": "attack-pattern--731f4f55-b6d0-41d1-a7a9-072a66389aea"}, {"type": "relationship", "id": "relationship--d82d2edb-847a-401d-aa26-a9d6fa9aa455", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--8379b6b7-d568-49e1-a44e-c3d9ea5eb44d", "target_ref": "attack-pattern--10d51417-ee35-4589-b1ff-b6df1c334e8d"}, {"type": "vulnerability", "id": "vulnerability--d0610a48-87d7-46c1-984a-a6fb649da38c", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2022-26138", "description": "Atlassian Questions For Confluence App Hard-coded Credentials Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26138", "source_name": "cve", "external_id": "CVE-2022-26138"}]}, {"type": "relationship", "id": "relationship--bb896902-7d7c-44ca-acac-35c09890eda5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d0610a48-87d7-46c1-984a-a6fb649da38c", "target_ref": "attack-pattern--837f9164-50af-4ac0-8219-379d8a74cefc"}, {"type": "vulnerability", "id": "vulnerability--fc8eff66-63cc-4c35-a0ac-4df2e90fb9d9", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2020-8657", "description": "EyesOfNetwork Use of Hard-Coded Credentials Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8657", "source_name": "cve", "external_id": "CVE-2020-8657"}]}, {"type": "relationship", "id": "relationship--5006be65-0ae7-433c-aebb-b927ba773fdc", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--fc8eff66-63cc-4c35-a0ac-4df2e90fb9d9", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "vulnerability", "id": "vulnerability--4a7a542b-37af-49d2-9eff-207a9934f08b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2024-20439", "description": "Cisco Smart Licensing Utility Static Credential Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20439", "source_name": "cve", "external_id": "CVE-2024-20439"}]}, {"type": "relationship", "id": "relationship--5f3cdd1e-fe6f-42fb-b918-11df7df28f46", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--4a7a542b-37af-49d2-9eff-207a9934f08b", "target_ref": "attack-pattern--435dfb86-2697-4867-85b5-2fef496c0517"}, {"type": "relationship", "id": "relationship--00d4dc64-2cf3-4994-9c2f-9201ece48038", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--4a7a542b-37af-49d2-9eff-207a9934f08b", "target_ref": "attack-pattern--391d824f-0ef1-47a0-b0ee-c59a75e27670"}, {"type": "vulnerability", "id": "vulnerability--d7e62476-8756-47a3-8dd0-6403d9a62006", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "name": "CVE-2025-30406", "description": "Gladinet CentreStack and Triofox Use of Hard-coded Cryptographic Key Vulnerability", "external_references": [{"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30406", "source_name": "cve", "external_id": "CVE-2025-30406"}]}, {"type": "relationship", "id": "relationship--3d10d8f0-c20c-4205-9bae-4fc149391e15", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--d7e62476-8756-47a3-8dd0-6403d9a62006", "target_ref": "attack-pattern--be2dcee9-a7a7-4e38-afd6-21b31ecc3d63"}, {"type": "relationship", "id": "relationship--4cd790bb-c6ac-4c51-890a-38ec9c50753b", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "primary-impact", "source_ref": "vulnerability--d7e62476-8756-47a3-8dd0-6403d9a62006", "target_ref": "attack-pattern--7385dfaf-6886-4229-9ecd-6fd678040830"}, {"type": "relationship", "id": "relationship--f600a047-25fc-4061-8c98-f81b914842c5", "spec_version": "2.1", "created": "2026-03-02T15:44:16.372224Z", "modified": "2026-03-02T15:44:16.372224Z", "relationship_type": "exploitation-technique", "source_ref": "vulnerability--60f275fb-8f87-499e-826f-ed6134bb31b8", "target_ref": "attack-pattern--b17a1a56-e99c-403c-8948-561df0cffe81"}]}