Class: Exploit
Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes. Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user. Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.Read more
Platform: Python
Python is a platform that is represented by scripts written in Python and binary files generated when these scripts are compiled.Family: CVE-2020-1472
No family descriptionExamples
1F48F93AED1AC712FBEB7B4F6F7CF39C753123F3F03CFFFDF8EA5E7A05FACDA5
B2C3EFB523DFAF5E9CDF29D9251B753B
7EE6275B9EB60813B00E8DD2F74E09B8
28A27034758910AA9DF5E57C68F014E1
Tactics and Techniques: Mitre*
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, .pfx, .cer, .p7b, .asc.
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, .pfx, .cer, .p7b, .asc.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.