input
stringlengths
30
54
output
stringlengths
69
4.21k
Describe the vulnerability CVE-2009-1671
CVE-2009-1671, State: PUBLISHED, Published: 2009-05-18T18:00:00, Updated: 2024-08-07T05:20:35.056Z, Description: Multiple buffer overflows in the Deployment Toolkit ActiveX control in deploytk.dll 6.0.130.3 in Sun Java SE Runtime Environment (aka JRE) 6 Update 13 allow remote attackers to execute arbitrary code via a l...
Techniques related with vulnerability CVE-2009-3041
CVE-2009-3041 in SPIP 1.9 before 1.9.2i and 2.0.x through 2.0.8. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2017-5613
CVE-2017-5613, State: PUBLISHED, Published: 2017-03-03T15:00:00, Updated: 2024-08-05T15:04:15.489Z, Description: Format string vulnerability in cgiemail and cgiecho allows remote attackers to execute arbitrary code via format string specifiers in a template file., No CVSS metrics available, Exploit Info: No exploit inf...
Techniques related with vulnerability CVE-2013-4335
CVE-2013-4335 in opOpenSocialPlugin. Is related with T1190 : Exploit Public-Facing Application. Is related with T1005 : Data from Local System. Is related with T1565 : Data Manipulation. Is related with T1499.004 : Application or System Exploitation.
Describe MITRE technique T0816
MITRE T0816 : Device Restart/Shutdown from ics Adversaries may forcibly restart or shutdown a device in an ICS environment to disrupt and potentially negatively impact physical processes. Methods of device restart and shutdown exist in some devices as built-in, standard functionalities. These functionalities can be e...
Techniques related with vulnerability CVE-2014-1815
CVE-2014-1815 in Internet Explorer 6 through 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe MITRE technique T1005
MITRE T1005 : Data from Local System from enterprise Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd...
Describe the vulnerability CVE-2020-5345
CVE-2020-5345, State: PUBLISHED, Published: 2020-06-23T20:00:17.264990Z, Updated: 2024-09-17T01:51:14.465Z, Description: Dell EMC Unisphere for PowerMax versions prior to 9.1.0.17, Dell EMC Unisphere for PowerMax Virtual Appliance versions prior to 9.1.0.17, and PowerMax OS Release 5978 contain an authorization bypass ...
Techniques related with vulnerability CVE-2015-2425
CVE-2015-2425 in Internet Explorer 11. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2012-0158
CVE-2012-0158 in Common Controls in Microsoft Office. Is related with T1189 : Drive-by Compromise. Is related with T1059 : Command and Scripting Interpreter. Is related with T1546 : Event Triggered Execution. Is related with T1554 : Compromise Client Software Binary. Is related with T1491 : Defacement. Is related with ...
Describe the vulnerability CVE-2012-2539
CVE-2012-2539, State: PUBLISHED, Published: 2012-12-12T00:00:00, Updated: 2024-08-06T19:34:25.771Z, Description: Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of...
Describe the vulnerability CVE-2020-3403
CVE-2020-3403, State: PUBLISHED, Published: 2020-09-24T18:02:13.753969Z, Updated: 2024-11-13T17:54:50.702Z, Description: A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the...
Techniques related with vulnerability CVE-2020-2883
CVE-2020-2883 in WebLogic Server. Is related with T1203 : Exploitation for Client Execution. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-2725
CVE-2019-2725 in Tape Library ACSLS. Is related with T1190 : Exploit Public-Facing Application. Is related with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2018-7496
CVE-2018-7496 in OSIsoft PI Vision. Is related with T1190 : Exploit Public-Facing Application. Is related with T1211 : Exploitation for Defense Evasion.
Describe MITRE technique T1078
MITRE T1078 : Valid Accounts from enterprise Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the netw...
Techniques related with vulnerability CVE-2020-0758
CVE-2020-0758 in Team Foundation Server 2018. Has primary impact with T1068 : Exploitation for Privilege Escalation. Has an exploitation technique T1098 : Account Manipulation.
Describe the vulnerability CVE-2019-10149
CVE-2019-10149, State: PUBLISHED, Published: 2019-06-05T00:00:00, Updated: 2024-08-04T22:10:09.944Z, Description: A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution., CVSS v3.0 - Attack...
Techniques related with vulnerability CVE-2017-3066
CVE-2017-3066 in Adobe ColdFusion ColdFusion 2016 Update 3 and earlier, ColdFusion 11 update 11 and earlier, ColdFusion 10 Update 22 and earlier. Is related with T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2009-2265
CVE-2009-2265, State: PUBLISHED, Published: 2009-07-05T16:00:00, Updated: 2024-08-07T05:44:55.927Z, Description: Multiple directory traversal vulnerabilities in FCKeditor before 2.6.4.1 allow remote attackers to create executable files in arbitrary directories via directory traversal sequences in the input to unspecifi...
Techniques related with vulnerability CVE-2018-1000861
CVE-2018-1000861 in Stapler web framework used by Jenkins 2.153 and earlier. Is related with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2020-11050
CVE-2020-11050 in Java-WebSocket. Has primary impact with T1190 : Exploit Public-Facing Application.
Techniques related with vulnerability CVE-2019-18578
CVE-2019-18578 in XtremIO. Has primary impact with T1059.007 : JavaScript. Has secondary impact with T1185 : Man in the Browser. Has an exploitation technique T1189 : Drive-by Compromise.
Techniques related with vulnerability CVE-2020-5210
CVE-2020-5210 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2010-1423
CVE-2010-1423, State: PUBLISHED, Published: 2010-04-15T21:12:00, Updated: 2024-08-07T01:21:19.151Z, Description: Argument injection vulnerability in the URI handler in (a) Java NPAPI plugin and (b) Java Deployment Toolkit in Java 6 Update 10, 19, and other versions, when running on Windows and possibly on Linux, allows...
Techniques related with vulnerability CVE-2015-7910
CVE-2015-7910 in Exemys Telemetry Web Server. Is related with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2020-6964
CVE-2020-6964, State: PUBLISHED, Published: 2020-01-24T16:32:13, Updated: 2024-08-04T09:18:02.496Z, Description: In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X and CARESCAP...
Techniques related with vulnerability CVE-2020-12655
CVE-2020-12655 in Linux kernel through 5.6.10. Is related with T1499.004 : Application or System Exploitation.
Techniques related with vulnerability CVE-2016-3714
CVE-2016-3714 in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution. Is related with T1204.001 : Malicious Link.
Techniques related with vulnerability CVE-2018-17924
CVE-2018-17924 in Rockwell Automation. Has primary impact with T0826 : Loss of Availability. Has secondary impact with T0803 : Block Command Message. Has secondary impact with T0804 : Block Reporting Message. Has an exploitation technique T0855 : Unauthorized Command Message.
Techniques related with vulnerability CVE-2013-1493
CVE-2013-1493 in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2014-2817
CVE-2014-2817 in Internet Explorer 6. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2020-5217
CVE-2020-5217, State: PUBLISHED, Published: 2020-01-23T02:15:17, Updated: 2024-08-04T08:22:08.919Z, Description: In Secure Headers (RubyGem secure_headers), a directive injection vulnerability is present in versions before 3.8.0, 5.1.0, and 6.2.0. If user-supplied input was passed into append/override_content_security_...
Describe the vulnerability CVE-2020-0884
CVE-2020-0884, State: PUBLISHED, Published: 2020-03-12T15:48:53, Updated: 2024-08-04T06:18:03.533Z, Description: A spoofing vulnerability exists in Microsoft Visual Studio as it includes a reply URL that is not secured by SSL, aka 'Microsoft Visual Studio Spoofing Vulnerability'., No CVSS metrics available, Exploit Inf...
Describe the vulnerability CVE-2019-3731
CVE-2019-3731, State: PUBLISHED, Published: 2019-09-30T21:48:40.294314Z, Updated: 2024-09-16T23:56:35.629Z, Description: RSA BSAFE Crypto-C Micro Edition versions prior to 4.1.4 and RSA Micro Edition Suite versions prior to 4.4 are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote use...
Describe the vulnerability CVE-2020-5250
CVE-2020-5250, State: PUBLISHED, Published: 2020-03-05T17:00:18, Updated: 2024-08-04T08:22:09.084Z, Description: In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are ...
Describe the vulnerability CVE-2020-5369
CVE-2020-5369, State: PUBLISHED, Published: 2020-09-02T20:55:17.768175Z, Updated: 2024-09-16T19:46:53.889Z, Description: Dell EMC Isilon OneFS versions 8.2.2 and earlier and Dell EMC PowerScale OneFS version 9.0.0 contain a privilege escalation vulnerability. An authenticated malicious user may exploit this vulnerabili...
Describe MITRE technique T0812
MITRE T0812 : Default Credentials from ics Adversaries may leverage manufacturer or supplier set default credentials on control system devices. These default credentials may have administrative permissions and may be necessary for initial configuration of the device. It is general best practice to change the password...
Describe the vulnerability CVE-2014-4113
CVE-2014-4113, State: PUBLISHED, Published: 2014-10-15T10:00:00, Updated: 2024-08-06T11:04:28.739Z, Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and ...
Describe the vulnerability CVE-2008-2992
CVE-2008-2992, State: PUBLISHED, Published: 2008-11-04T18:00:00, Updated: 2024-08-07T09:21:34.450Z, Description: Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format...
Describe the vulnerability CVE-2013-3893
CVE-2013-3893, State: PUBLISHED, Published: 2013-09-18T10:00:00, Updated: 2024-08-06T16:22:01.292Z, Description: Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, ...
Techniques related with vulnerability CVE-2018-15764
CVE-2018-15764 in ESRS Policy Manager. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1190 : Exploit Public-Facing Application.
Describe the vulnerability CVE-2018-10376
CVE-2018-10376, State: PUBLISHED, Published: 2018-04-25T09:00:00, Updated: 2024-08-05T07:39:07.523Z, Description: An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital asse...
Techniques related with vulnerability CVE-2018-18987
CVE-2018-18987 in VT-Designer Version 2.1.7.31. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1574 : Hijack Execution Flow. Has secondary impact with T1499.004 : Application or System Exploitation.
Describe the vulnerability CVE-2019-18263
CVE-2019-18263, State: PUBLISHED, Published: 2019-12-20T15:27:16, Updated: 2024-08-05T01:47:14.119Z, Description: An issue was found in Philips Veradius Unity, Pulsera, and Endura Dual WAN Router, Veradius Unity (718132) with wireless option (shipped between 2016-August 2018), Veradius Unity (718132) with ViewForum opt...
Describe the vulnerability CVE-2019-1214
CVE-2019-1214, State: PUBLISHED, Published: 2019-09-11T21:24:58, Updated: 2024-08-04T18:13:29.129Z, Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vu...
Techniques related with vulnerability CVE-2014-1812
CVE-2014-1812 in Windows. Is related with T1003 : OS Credential Dumping. Is related with T1552.001 : Credentials In Files.
Describe the vulnerability CVE-2010-2729
CVE-2010-2729, State: PUBLISHED, Published: 2010-09-15T18:00:00, Updated: 2024-08-07T02:46:48.161Z, Description: The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does ...
Describe the vulnerability CVE-2020-3177
CVE-2020-3177, State: PUBLISHED, Published: 2020-04-15T20:10:20.904083Z, Updated: 2024-11-15T17:31:41.239Z, Description: A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could all...
Techniques related with vulnerability CVE-2018-11067
CVE-2018-11067 in Avamar. Has secondary impact with T1036 : Masquerading. Has an exploitation technique T1566.002 : Spearphishing Link.
Describe the vulnerability CVE-2018-15780
CVE-2018-15780, State: PUBLISHED, Published: 2019-01-03T21:00:00Z, Updated: 2024-09-17T03:37:26.681Z, Description: RSA Archer versions prior to 6.5.0.1 contain an improper access control vulnerability. A remote malicious user could potentially exploit this vulnerability to bypass authorization checks and gain read acce...
Techniques related with vulnerability CVE-2019-3786
CVE-2019-3786 in BOSH Backup and Restore. Has primary impact with T1005 : Data from Local System. Has an exploitation technique T1565.001 : Stored Data Manipulation.
Describe the vulnerability CVE-2019-1831
CVE-2019-1831, State: PUBLISHED, Published: 2019-04-18T01:20:26.675817Z, Updated: 2024-11-19T19:10:48.135Z, Description: A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters o...
Describe the vulnerability CVE-2018-5459
CVE-2018-5459, State: PUBLISHED, Published: 2018-02-13T21:00:00, Updated: 2024-08-05T05:33:44.375Z, Description: An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys R...
Describe the vulnerability CVE-2020-3379
CVE-2020-3379, State: PUBLISHED, Published: 2020-07-16T17:21:51.004104Z, Updated: 2024-11-15T16:53:01.086Z, Description: A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to i...
Techniques related with vulnerability CVE-2020-5350
CVE-2020-5350 in Integrated Data Protection Appliance. Has primary impact with T1059 : Command and Scripting Interpreter. Has secondary impact with T1098 : Account Manipulation.
Techniques related with vulnerability CVE-2020-5331
CVE-2020-5331 in RSA Archer. Has primary impact with T1005 : Data from Local System.
Describe the vulnerability CVE-2019-1013
CVE-2019-1013, State: PUBLISHED, Published: 2019-06-12T13:49:39, Updated: 2024-08-04T18:06:31.296Z, Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique fr...
Describe the vulnerability CVE-2014-6324
CVE-2014-6324, State: PUBLISHED, Published: 2014-11-18T23:00:00, Updated: 2024-08-06T12:10:13.306Z, Description: The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and...
Describe the vulnerability CVE-2017-8464
CVE-2017-8464, State: PUBLISHED, Published: 2017-06-15T01:00:00, Updated: 2024-08-05T16:34:23.052Z, Description: Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 20...
Techniques related with vulnerability CVE-2019-1781
CVE-2019-1781 in Cisco NX-OS Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1078 : Valid Accounts.
Describe the vulnerability CVE-2020-5358
CVE-2020-5358, State: PUBLISHED, Published: 2020-06-15T20:20:11.377037Z, Updated: 2024-09-17T01:56:50.455Z, Description: Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with lo...
Techniques related with vulnerability CVE-2019-10971
CVE-2019-10971 in Network Configurator for DeviceNet Safety. Has primary impact with T1574.001 : DLL Search Order Hijacking.
Describe the vulnerability CVE-2020-12769
CVE-2020-12769, State: PUBLISHED, Published: 2020-05-09T20:16:45, Updated: 2024-08-04T12:04:22.954Z, Description: An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8., No CVSS m...
Techniques related with vulnerability CVE-2019-1772
CVE-2019-1772 in Cisco WebEx WRF Player. Has primary impact with T1059 : Command and Scripting Interpreter. Has an exploitation technique T1566 : Phishing. Has an exploitation technique T1204.002 : Malicious File.
Describe the vulnerability CVE-2013-0632
CVE-2013-0632, State: PUBLISHED, Published: 2013-01-17T00:00:00, Updated: 2024-08-06T14:33:05.651Z, Description: administrator.cfc in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code by logging in to the RDS component using the default empty...
Techniques related with vulnerability CVE-2019-18581
CVE-2019-18581 in Data Protection Advisor. Has primary impact with T1562 : Impair Defenses. Has secondary impact with T1059 : Command and Scripting Interpreter.
Techniques related with vulnerability CVE-2015-2419
CVE-2015-2419 in JScript 9 in Microsoft Internet Explorer 10 and 11. Is related with T1203 : Exploitation for Client Execution. Is related with T1189 : Drive-by Compromise.
Describe MITRE technique T1574.001
MITRE T1574.001 : DLL Search Order Hijacking from enterprise Adversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program. (Citation: Microsoft Dynamic Link Library Search Order)(Citation: FireE...
Describe the vulnerability CVE-2019-0797
CVE-2019-0797, State: PUBLISHED, Published: 2019-04-09T02:34:55, Updated: 2024-08-04T17:58:59.172Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from C...
Techniques related with vulnerability CVE-2018-17892
CVE-2018-17892 in NUUO CMS. Has primary impact with T1562 : Impair Defenses.
Describe the vulnerability CVE-2018-19207
CVE-2018-19207, State: PUBLISHED, Published: 2018-11-12T17:00:00, Updated: 2024-08-05T11:30:04.040Z, Description: The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the ...
Techniques related with vulnerability CVE-2011-2005
CVE-2011-2005 in Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2017-1274
CVE-2017-1274 in Domino. Is related with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2015-2590
CVE-2015-2590 in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-11897
CVE-2020-11897 in Treck TCP/IP stack before 5.0.1.3. Is related with T1190 : Exploit Public-Facing Application. Is related with T1203 : Exploitation for Client Execution. Is related with T1499 : Endpoint Denial of Service.
Describe MITRE technique T0826
MITRE T0826 : Loss of Availability from ics Adversaries may attempt to disrupt essential components or systems to prevent owner and operator from delivering products or services. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay) Adversaries may leverage malware to delete...
Describe MITRE technique T1552.004
MITRE T1552.004 : Private Keys from enterprise Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.(Citation: Wikipedia Public Key Crypto)...
Describe the vulnerability CVE-2018-19007
CVE-2018-19007, State: PUBLISHED, Published: 2018-12-14T20:00:00, Updated: 2024-08-05T11:23:09.034Z, Description: In Geutebrueck GmbH E2 Camera Series versions prior to 1.12.0.25 the DDNS configuration (in the Network Configuration panel) is vulnerable to an OS system command injection as root., No CVSS metrics availab...
Techniques related with vulnerability CVE-2019-15821
CVE-2019-15821 in bold-page-builder plugin before 2.3.2 for WordPress. Is related with T1068 : Exploitation for Privilege Escalation. Is related with T1133 : External Remote Services. Is related with T1136 : Create Account. Is related with T1565 : Data Manipulation. Is related with T1149 : LC_MAIN Hijacking .
Techniques related with vulnerability CVE-2018-0798
CVE-2018-0798 in Equation Editor. Is related with T1189 : Drive-by Compromise. Is related with T1203 : Exploitation for Client Execution.
Techniques related with vulnerability CVE-2020-5328
CVE-2020-5328 in Isilon OneFS. Has secondary impact with T1068 : Exploitation for Privilege Escalation.
Techniques related with vulnerability CVE-2019-1943
CVE-2019-1943 in Cisco Small Business 300 Series Managed Switches. Has primary impact with T1565.002 : Transmitted Data Manipulation. Has secondary impact with T1189 : Drive-by Compromise. Has an exploitation technique T1557 : Man-in-the-Middle.
Describe the vulnerability CVE-2020-8468
CVE-2020-8468, State: PUBLISHED, Published: 2020-03-18T00:30:43, Updated: 2024-08-04T10:03:44.778Z, Description: Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certa...
Describe the vulnerability CVE-2019-1132
CVE-2019-1132, State: PUBLISHED, Published: 2019-07-29T14:13:38, Updated: 2024-08-04T18:06:31.730Z, Description: An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'., No CVSS metrics available, ...
Describe the vulnerability CVE-2019-1857
CVE-2019-1857, State: PUBLISHED, Published: 2019-05-03T16:40:23.067089Z, Updated: 2024-09-17T02:27:18.712Z, Description: A vulnerability in the web-based management interface of Cisco HyperFlex HX-Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform ar...
Describe the vulnerability CVE-2019-15289
CVE-2019-15289, State: PUBLISHED, Published: 2020-09-23T00:30:13.703662Z, Updated: 2024-11-13T18:02:40.021Z, Description: Multiple vulnerabilities in the video service of Cisco TelePresence Collaboration Endpoint (CE) and Cisco RoomOS Software could allow an unauthenticated, remote attacker to cause a denial of service...
Techniques related with vulnerability CVE-2018-15466
CVE-2018-15466 in Cisco Policy Suite (CPS) Software. Has primary impact with T1608 : Stage Capabilities. Has secondary impact with T1005 : Data from Local System.
Techniques related with vulnerability CVE-2018-8589
CVE-2018-8589 in Windows Server 2008. Is related with T1203 : Exploitation for Client Execution.
Describe the vulnerability CVE-2017-18362
CVE-2017-18362, State: PUBLISHED, Published: 2019-02-05T05:00:00, Updated: 2024-08-05T21:20:50.848Z, Description: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have ...
Techniques related with vulnerability CVE-2019-3775
CVE-2019-3775 in UAA Release (OSS). Has primary impact with T1098 : Account Manipulation.
Techniques related with vulnerability CVE-2020-5253
CVE-2020-5253 in NetHack. Has primary impact with T1574 : Hijack Execution Flow. Has primary impact with T1499.004 : Application or System Exploitation. Has an exploitation technique T1478 : Install Insecure or Malicious Configuration.
Techniques related with vulnerability CVE-2020-11087
CVE-2020-11087 in FreeRDP. Has primary impact with T1005 : Data from Local System. Has secondary impact with T1211 : Exploitation for Defense Evasion.
Describe the vulnerability CVE-2019-1031
CVE-2019-1031, State: PUBLISHED, Published: 2019-06-12T13:49:40, Updated: 2024-08-04T18:06:31.538Z, Description: A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoin...
Describe the vulnerability CVE-2014-0266
CVE-2014-0266, State: PUBLISHED, Published: 2014-02-12T02:00:00, Updated: 2024-08-06T09:13:09.697Z, Description: The XMLHTTP ActiveX controls in XML Core Services 3.0 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8....
Describe MITRE technique T1489
MITRE T1489 : Service Stop from enterprise Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(C...
Describe the vulnerability CVE-2020-5295
CVE-2020-5295, State: PUBLISHED, Published: 2020-06-03T21:50:12, Updated: 2024-08-04T08:22:09.093Z, Description: In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, an attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only e...
Describe the vulnerability CVE-2019-18571
CVE-2019-18571, State: PUBLISHED, Published: 2019-12-18T20:50:13.968502Z, Updated: 2024-09-16T19:10:42.619Z, Description: The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain a reflected cross-site scripting vulnerability in the My Access Live module [MAL]. ...
Techniques related with vulnerability CVE-2018-11060
CVE-2018-11060 in RSA Archer. Has primary impact with T1068 : Exploitation for Privilege Escalation.
Describe the vulnerability CVE-2017-0222
CVE-2017-0222, State: PUBLISHED, Published: 2017-05-12T14:00:00, Updated: 2024-08-05T12:55:19.287Z, Description: A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0226., ...