CVE-2020-12812

Vulnerability updated 4 months ago (2024-05-04T18:19:00.979Z)
Download STIX
Preview STIX
Not enough context has been learned about CVE-2020-12812 for a description yet. However we're tracking it as a Vulnerability profile. Vulnerability: A flaw in software design or implementation
Description last updated:
What's your take? (Question 1 of 4)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Adlumin
Ransomware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
HiveUnspecified
2
Hive is a malicious software (malware) that has been used by the cybercriminal group, Hunters International, to launch ransomware attacks since October of last year. The group operates as a ransomware-as-a-service (RaaS) provider, spreading Hive rapidly through collaborations with less sophisticated
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
ProxynotshellUnspecified
2
ProxyNotShell is a software vulnerability, specifically a flaw in the design or implementation of Microsoft Exchange Server. It was first identified and exploited through CVE-2022-41082, as reported by Palo Alto Networks' Unit 42. The ProxyNotShell exploit method leveraged an AutoDiscover endpoint t
CVE-2018-13379Unspecified
2
CVE-2018-13379 is a critical vulnerability that affects FortiOS and Fortiguard, presenting a flaw in their software design or implementation. This specific vulnerability, which can expose sensitive credentials, has been frequently exploited, making the top 15 most routinely exploited list in both 20
Source Document References
Information about the CVE-2020-12812 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
9 months ago
Emerging Threat: What to Know About the Play Ransomware Group
BankInfoSecurity
9 months ago
Breach Roundup: MongoDB Blames Phishing Email for Breach
CISA
9 months ago
#StopRansomware: Play Ransomware | CISA
CERT-EU
9 months ago
Play Ransomware: SafeBreach Coverage for US-CERT Alert (AA23-352A)
CERT-EU
a year ago
PLAY Cyber Attack: 6 New Victims Targeted In Ransom Attack
CERT-EU
a year ago
Play Ransomware Targets Victims Via MSPs’ RMM Software
BankInfoSecurity
a year ago
Play Ransomware Using MSPs and N-Days to Attack
DARKReading
a year ago
'Play' Ransomware Group Targeting MSPs Worldwide in New Campaign
CERT-EU
a year ago
Play Ransomware Using MSPs and N-Days to Attack
CISA
2 years ago
Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations | CISA
CISA
2 years ago
#StopRansomware: Hive Ransomware | CISA
CERT-EU
2 years ago
#StopRansomware: Hive Ransomware | CISA | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security
CERT-EU
2 years ago
Play Ransomware Attack Playbook Similar to that of Hive, Nokoyawa | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security