CVE-2013-3900

Vulnerability updated 4 months ago (2024-04-24T05:15:19.735Z)
Download STIX
Preview STIX
Not enough context has been learned about CVE-2013-3900 for a description yet. However we're tracking it as a Vulnerability profile. Vulnerability: A flaw in software design or implementation
Description last updated:
What's your take? (Question 1 of 0)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
3cx
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2013-3900 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
SANS ISC
4 months ago
API Rug Pull - The NIST NVD Database and API (Part 4 of 3) - SANS Internet Storm Center
CERT-EU
a year ago
Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
Trend Micro
2 years ago
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
DARKReading
a year ago
Millions of Pen Tests Show Companies' Security Postures Are Getting Worse
DARKReading
a year ago
3CX Breach Widens as Cyberattackers Drop Second-Stage Backdoor
CERT-EU
a year ago
This Week In Security: Cookie Monster, CyberGhost, NEXX, And Dead Angles
BankInfoSecurity
a year ago
Microsoft Patches Zero-Day Bug Exploited by Ransomware Group
CERT-EU
a year ago
Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server